CIS 1 - SMC - Combined 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

data manipulation

Which of the following would be considered a cybercrime?

*only have on firewall*

*could lead to issues if you have more than one*

Devices manufactured by Samsung

- Galaxy - Note

Cyberattacks include:

-identity theft -pharming -DDOS attacks

parental control in microsoft

1) open 2) click 3)under 4) adjust

1. Input 2. Storage device 3. output

1. game controller, speaker 2.projector, external hard drive 3.hard drive, mouse

DVDs provide approximately ___ of data storage space

4.5 GB

Zombie

A computer controlled by a hacker is called a _____.

Inkjet printers are often sold ____ their production cost.

Below

An integral part of a database management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data _________

Dictionary

A separate processor (computer) in your computer that enhances your video is called the ___ .

Graphic processor (GPU)

User preferences

Persistent cookies store information about

Which of the following are online nuisance

Spyare Spam Spoofing

Spyware

Spyware is software that collects information about your Internet surfing habits and behaviors. Includes the collection of keystrokes, passwords, and confidential information. Often installed via free downloads or by visiting certain illegitimate websites

To uninstall an app from your Windows 10 device a quick way is to first click the ___ . - Start - Microsoft Edge button - File Explorer icon - Settings button

Start

Apple developed ______ to work better with Mac OS and iOS

Swift

A terabyte is equal to approximately 1 _________ bytes

Trillion

A computer controlled by a hacker is called a ____.

Zombie

Zip

a lossless compression format

output

a printout of a spreadsheet

How is the screensize of a laptop computer measured?

diagonally from left corner to right corner

The devices inside your phone that convert analog waves into digital signals that your phone can process are called ______

digital- analog converters

Solid state drives store data using

electronic circuits

Solid state drives store data using ___ .

electronic circuits

The art and science of creating output that provides information in the most useful manner is called ___ .

ergonomics

hardware or software to keep a computer secure

firewall

which tab would you click to delete cookies?

general

Rachel notics that her Facebook account displyas advertisements based on her personal profile and browsing history

online nuisance: adware

An unsolicited email message is called _____.

spam

DeSean received an unsolicited email message from an unknown sender. this email was

spam

software that collects info about your internet surfing habits and behaviors

spyware

software that collects information about your internet surfing habits and behaviors is called

spyware

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

_________ is the shorthand programmers use while building an algorithm

Pseudocode

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage

RAID

The accuracy of a digital recording is determined by the device's ___ rate.

Sampling

Common video file formats

- .mov -.avi

select the common audio file formats:

-.mp3 -.mp4 (M4A) -.wav

Select the traits that are currently used for biometric identification.

-fingerprint -irises

Common types of malware include______

-viruses -worms -trojan horses

4 books uses approximately

1 megabyte of data

1. Input 2. Storage 3. Output

1. Entering text in a word 2. Putting a photo onto a USB drive (thumbdrive). 3. Playing a song from Spotify.

1. Virus 2.Cyber attack

1. Trojan Horse, Worm, and Macro 2. Rootkiit, Packet Analyzer, and DOS attack

Popularized with transistor radios in the 1950s, this connector is used with nearly all cell phones today. It is a ________

3.5 mm connector

CD-R

A disc that can be burned once

DVD-ROM

A disc that cannot be burned

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.

DVDs store data using

A reflective coating that has pits and lands

Rootkit

A rootkit is a type of malware that is triggered each time you boot your computer. Rootkits are software programs that hide in the operating system. A rootkit often allows for the installation of hidden files and for a remote user to use and take control of the computer.

Spam filter

A spam filter is computer software that is designed to prevent spam messages from entering a user's email inbox. Spam filters are also known as spam blockers or anti-spam utilities. Spam filters search for spam by watching for keywords and by monitoring suspicious word patterns and frequencies.

Which would be used to store a single bit of data?

A transistor and a hole in a punchcard

Email virus

A virus that is attached in a file and sent via e-mail. When the infected file is opened, the virus infects the computer. Phishing - tricks users into revealing usernames and passwords by appearing legitimate. Ransomware - when activated, encrypts files on user hard drive and then sells a decryption program. Keystroke logging Trojan - when activated, saves all keystrokes for subsequent transmission to virus creator.

Which of the following numbers is the decimal number 25 converted to hexadecimal? A)19 B)20 C)18 D)12

A)19

Unicode is a system for the interchange, processing, and display of the written texts of the diverse languages of the modern world. A)True B)False

A)True

a set of programs that allow data to be exchanged on a website without changing the websites display is _______________`

AJAX (asynchronous javascript and xml)

spam

An unsolicited email message is called _____

Which of these operating systems is based on Linux and used on smartphones

Android

AJAX stands for ___ JavaScript and XML

Asynchronous

Which of the following is the binary number 1111 1111 converted to hexadecimal? A)DF B)FF C)AF D)GF

B)FF

In an ASCII file, each alphabetic, numeric, or special character is represented with a 16-bit binary number. A)True B)False

B)False

What if I get a phishing message?

Banks and credit card companies will never ask you to provide personal information via email messages, so do not give out any information. If you receive a suspicious message, contact the institution that the message was allegedly sent from. Report the incident to US-CERT.

Literally meaning "life measure", ________ technologies enable accurate identification

Biometric

A short-range wireless transmission protocol is known as _____ .

Bluetooth

A group of compromised computers controlled by a hacker is called a ____.

Botnet

Black Hat Hacker

Break into computer systems with the intent of causing damage or stealing data. Also known as hackers or crackers.

Two factors that affect a processor's speed are clock speed and _______ width

Bus

Shortcut for print

CTRL + P

Shortcut for save

CTRL + S

Most touchpads use _____ to sense when a finger has moved across the pad.

Capacitance

Select what is true about persistent cookies

Collect information about user preferences Collect formation about the IP Address Collect password and username information

Keyboard shortcut for select all

Command + A

Keyboard shortcut for find

Command + F

Keyboard shortcut for save

Command + S

Keyboard shortcut for screenshot

Command + shift + 3

Select what's true about macro viruses

Commands in the macro language set off the destructive event When file is opened the macro virus execute Initiated by downloading and opening on infected attachment

Two characteristics of thermal printing:

Commonly used for printing receipts Paper turns black when heated

A digital device that accepts input, processes and stores the input, and provides output is a ________

Computer

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

Contrast

A description of the difference in the luminence of a display's white pixels compared to the black pixels is called _______ ratio

Contrast

One disadvantage of cloud storage is that

Data is only available when you're online

Devices with a separate system unit and a relatively large footprint are called ________ computers

Desktop

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

DDoS stands for

Distributed Denial of Service

What does DDoS stand for?

Distributed Denial of Service

In the US the federal ______ covers most consumer oriented electronic transactions

EFT Act

Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.

Extensible Markup Language

Today's computer keyboard was named after Sir Wesley Reginald Qwerty, inventor of the typewriter.

False

The main government organization that oversees internet privacy is the _____

Federal Trade Commission

An application that navigates all of the files and folders on your Mac is the _____ .

Finder

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.

Firewall

Intel

Founded in 1968, largest manufacturer of processors

AMD

Founded in 1969, in all video game consoles

Nvidia

Founded in 1993, produces mobile consoles

A laptop computer's RAM is measured in ____ of data

Gigabytes

A separate processor in your computer that enhances your video is called the _________

Graphics processor

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.

Hacker

Characteristics of a laser printer (4):

Higher initial costs Popular in offices Use toner Far faster when printing multiple copies

Which acronym refers to a type of computer monitor?

IKR

contact US-CERT

If you believe you have fallen victim to a phishing scam you should

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

All of the following are true about Instagram excep

Instagram charges a fee to download the app.

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

The most common method of eye recognition uses the ______

Iris

Which of these programs make data more readable to programmers by parsing XML files?

JSON

which of these programs make data more readable to programmers by parsing XML files?

JSON

the ______ cache is located directly on the processor itself.

L1

Select what is true about packet sniffers

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.

Life

Commonly used for smartphones and tablet displays

Liquid Crystal Display

When you open the Windows 10 start menu, colorful boxes containing constantly updated (when you're online) information appears. Microsoft calls these boxes ___ . - Widgets - Pinned Boxes - Info Boxes - Live Tiles

Live tiles

L1 cache

Located directly on the processor itself

L3 cache

Located next to the processor

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip

MEMS

Characteristics of an inkjet printer:

Makes fast single copy color pages Uses ink Popular for home use Low initial cost

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

The technology that provides a type of firewall protecting by hiding internal IP addresses is called

NAT

When compared to cell phone cameras, most point-and-shoot cameras use photographic technology that is ____________.

Nearly the same

white hat

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hackers.

___________ focuses on categorizing inputs and outputs for reusability

Object oriented programming

quarantine

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

Writing software follows a 5-step process called the

PDLC Program Development Life Cycle

CTRL+V

Paste

When you personally share an image on Pinterest it is known as a _____.

Pin

An unsolicited email message is called ____.

Spam

Spam

Spam is an unsolicited email message. Spam messages are sometimes called UBE, unsolicited bulk email, and are used for a variety of marketing purposes including selling products and services. Messages may contain a variety of malicious programs.

UBE

Spam messages are sometimes referred to as ___.

snakes

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

Packet Sniffer

Specialized hardware or software that capture packets transmitted over a network. Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information. Packet sniffers can be very difficult to detect.

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processor

Spectre Meltdown

An easy to use camera that has an extremely strong optical zoom is a _________

Superzoom

_______ is an easy to use camera with an extremely strong optical zoom

Superzoom

which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

hacktivism

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

cyberattack

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

How a computer virus works

The virus arrives via email attachment, file download, or by "clicking" in an infected website. An action triggers the virus. The virus spreads to other computer/devices or networks. The activated virus starts its destructive actions.

How a computer virus works

The virus arrives via email attachment, file download, or by "clicking" in an infected website.•An action triggers the virus. •The virus spreads to other computer/devices or networks.•The activated virus starts its destructive actions.

When you get a receipt from a store or restaurant, its probably printed on ________ paper.

Thermal

The world wide web was created through a collaboration led by

Tim Berners- Lee

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Title 5 - Copyright Protection Proviso.

Laser printers are popular in offices because they use relatively inexpensive ________.

Toner

The programming design that forces programmers to consider how the algorithm can be written in computer code by first breaking it down into smaller tasks is called

Top-down programming design

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

Trade

Spam messages are sometimes called _ and are used for a variety of marketing purposes including selling products and services

UBE

Spam messages are sometimes referred to as ___.

UBE

Click on the organization below that you should contest if you receive a phishing message

US-CERT

What are symptoms that your system has been hacked

Unwanted browser toolbars Redirected internet searches Fake emails or social media messages from your account

Disk cache

Used to increase disk efficiency

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called __________.

Video conferencing

Select the audio file compression formats.

WAV MP4

the original wireless network privacy and protection standard for wifi was known at _____________

WEP

Common types of malware include

Worm Tojans Viruses

_______ was designed to display documents on the web. It provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display

XML (extensible markup language)

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a

Zombie

program scan files to identify

antivirus software

firewire connectors were developed for ___________ computers

apple

on a Macintosh home screen, where do you click to access to adjust parental control settings?

apple and settings

When referring to digital storage, RAID stands for redundant ____ of independent disks

array

The capacity of a particular transmission medium is called its

bandwidth

A gigabyte equals approximately one _____ bytes.

billion

a group of compromised computers controlled by a hacker is called a _____________

botnet

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

cache

relatively small amount of memory (measured in kilobytes and megabytes)

cache

select the true statements regarding an LED display

can be extremely thin, great for well-lit areas, extremely energy efficient

most touchpads use __________ to sense when a finger has moved across the pad

capacitance

optical storage media: capacity of up to 700 mb

cd

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

checks

magnetic ink recognition (MICR) is a technology that is most commonly seen on _____________

checks

after you have clicked on the privacy tab in safari, which of the following are way to efficiently remove cookies and stored data?

click- remove all website data, or click details then select one or more websites, then click remove

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ______ storage

cloud

The number of bits of data describing each pixel in a display is referred to as ___ .

color depth

italicize

command+I

paste

command+V

undo last action

command+Z

A ________ checks for errors and converts an entire program from source code to machine language

compiler

software that infects computers and is created using is

computer cirus

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

creative

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

debugging

true about ergo

derived the study a very

For audio output, digital devices use _________ converters

digital-to-analog

A database that stores data in different physical locations and that users access through client/ server networks is called a ________ database

distributed

Audio output is created by converting...

electrical impulses into air movement

Solid state drives store data using ______

electronic circuits

EDI stands for __________

electronic data interchange

Software theft occurs when someone engages in all of the following except _______.

erasing a program you purchased then sold to a friend

the art and science of creating output that provides information in the most useful manner is called _____________-

ergonomics

All new laptop computers come with an optical drive installed.

false

match the business information system (IS) activity with the appropriate manage level: use IS for scheduling daily and weekly operations

first level managers (supervisors, floor managers)

which of the following is a strength of the linux platform?

free to download and use

Blu-ray disks have pits and lands that absorb or reflect a laser beam and can store approximately 25 ___ of data (single layer)

gigabytes

select the email services

gmail, outlook, icloud

the visual image output that a computer creates is known as _____________

graphics

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a

hacker

Magnetically charged particles on spinning disks is how traditional ____ drives store data

hard

overheating, humidity, and magnetic fields can cause damage to the ___ of a digital device

hardware

MEMS chips are used in which of the following?

hearing aids, pet identification chips, poker chips

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.

helium

What is equal to one cycle per second?

hertz

What are some commonly used names for USB drives?

humb drives flash drives

MAC address

identifies a device within a network

what is true regarding the length of a USB cord?

in general, the more data being transmitted, the shorter the cord should be

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

a form of spyware that records all actions typed on a keyboard is called a ___ logger

keystroke

Optical disks, such as CDs, store data using pits and ____

lands

Another term for a programming code is a programming ___ .

language

another term for a programming code is a programming ____________________

language

Because of their compact size, touchpads are most often used with _____ computers.

laptop

the process used to develop and maintain and IT system is referred to as the SDLC. SDLC stands for the system development _______________ cycle

life

a virus written a specific language and placed within a document or spreadsheet is called a ___ virus

macro

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

macro virus

a virus written in a macro language and placed within a document or spreadsheet is called a

macro virus

Most desktop computers use ___ to store data.

magnetic hard drives

Most desktop computers use _____ to store data

magnetic hard drives

most desktop computers use ______________ to store data

magnetic hard drives

experts suggest using password ___ software to keep your passwords safe

management

android OS released in 2015

marshmallow

A million bytes of data equals approximately one ___

megabyte

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a ______

memristor

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n)

memristor

Because it is small, energy-efficient, and fast ___ storage is commonly used in smartphones

microSD

Fiber optic cable is ______ expensive than coaxial cable to install

more

fiber optic cable is _____________ expensive than coaxial cable to install

more

LCD

most laptops, tablets, and smartphones use an _ display

hiding ip

nat

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

All of the following are part of an RFID system except _____.

network

When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is _____.

not saved

when inputs can be easily placed into different categories or classes, a(n) _______________ -oriented analysis works well

object

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

running the processor faster than recommended by the manufacturer is called _____________. this can increased performance and speed, but will also void the manufacturer warranty

overclocking

expert suggest

password management

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files

peer-to-peer

Server banks have capacities measured in

petabytes

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

A type of phishing that seeks to obtian information through malicious software that is inserted on victims' computers and directs them to fake webpage is called

pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

phraming

A request for an electronic "echo" or response form another computer or server is called a ______

ping

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

plasma

a point (a hole or slot) in a computer, designed to accept a specific connector, is called a _________

port

match the extension with the type of document: .pez

presentation

Select the peripherals.

printer monitor tablet

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

once the virus is identified the antivirus software attempts to remove the virus from the file. if the software cannot remove the infected file it will send the file to an isolated area on the hard disk called

quarantine

once the viruses identify

quarantine

In a database, a row of information is called a _____

record

Lossless

reduces space required by reducing redundancy within files

Lossy

reduces space required by removing less valuable data

passport issued

rfid chips

The most common method of renaming files and folders is to simple _____ on the item and select Rename

right-click

a type of malware that is triggered each time you boot your computer is called a

rookit

Typically computer viruses must be _ to attack and do damage to digital device

run

typically computer viruses must be--- to attack and do damage to a digital device

run

The two major concerns regarding cloud storage are reliability and _______

security

Two main factors concerning your digital identity are privacy and ___.

security

two major concerns regarding cloud storage are reliability and ___________

security

command+a

select all

internet filter installed

server router computer

typed of cookie is stored in temporary

session

The small computer within your phone that enhances the sound quality of your call is called a digital ______ processor

signal

The software code of a particular computer virus is called the virus

signature

Data from the hard drive reaches the CPU _____ than data from the RAM.

slower

web cookies

small text file of information created by websites you visit that your web browser stores on your hard drive

third party cookie

small text file of information. created by a website other than the one you currently visiting and are used to track your surfing habits and are considered an invasion of privacy

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.

software piracy

Desean received an unsolicited email message from an unknown sender. This email was

spam

Unsolicited email is

spam

match the extension with the type of document: .xlxs

spreadsheet

Select activities that would be considered software theft.

stealing software programs -illegally copying a program

because objective-c was difficult to write in, apple developed _________________, a programming language for writing software for the mac OS and iOS

swift

The cell tower's base transmission station is connected to a mobile _____ station

switching

allow for interchangeable lenses and have a camera that allows the photographer to look directly through the lens

the features of a DSLR camera are they _

Laser printers are popular in offices because they use relatively inexpensive ___ .

toner

Laser printers are popular in offices because they use relatively inexpensive _________.

toner

The pointing device found on nearly all laptops is a

touchpad

Select the smartphone input device.

touchscreen or keyboard

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

touchscreens

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

trade

the main governmental organization that oversees internet privacy is the federal ______________ commission

trade

The platform or operating system of a computer controls all of the functions of a computer.

true

protected by intellectual

video games movies

software code of particular

viruses signature

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.

voice

with ___________ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charter and compared to existing records

voice

In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ______, than those in less populate areas

weaker

match the extension with the type of document: .html

webpage

A businesses brand is derived from all of the following except ______ .

what their competition perceived them to be

Ransomware

when activated, encrypts files on user hard drive & then sets a decryption program

voice

with _ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records

spam filters search for spam by watching for key words and by monitoring suspicious ----- patterns and frequencies

word

spam filters search for spam by watching for keywords and by monitoring suspicious --- patterns and frequencies.

word

spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies

word

the maximum number of bits per instruction that a CPU can process during 1 machine cycle is called _____________

word size

DVDs

- stores roughly 4.5 GB - used for movie rentals (non-HD)

Online Nuisance

-spoofing -Trolling -spyware -phishing

DVD-RW

A disc that can be burned multiple times

Printer speed is described using which acronym?

PPM

overheating,humanity

hardware

uses toner cartridges

laser printer

main governmental

trade

a computer controlled by a hacker

zombie

Most PC games have been written in either ___ or ___ .

C C++

The most common digital cameras (2)

DSLR and point-and-shoot

Gigahertz

Equal to one billion cycles (or instructions) per second

The image compression formats

JPEG PNG

CTRL+A

Select All

copy

command+C

signed by clinton 1988

digital

50dollar

for bank

worms

reproduce type o thing

DMCA digital

title2,1,3

1. Internet scams 2. cyberespionage 3. information theft

Which of the following are considered cybercrimes?

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack

there are several ways to rename a folder in windows. which of these would work?

-on the command bar, click organize and then click rename -click the folder icon and press F2 to activate the edit mode -right click a folder, then click rename

1. MIDI 2. HDMI 3. Plug and Play

1. Capable of carrying digital music signals and are common in today's music scene 2. allows for the transmission of high-definition audio and video signals 3. a technology that enables the OS to detect and configure peripherals without downloading software or drivers

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cybercrime

Several ways to create a new folder in Windows

- Right-click a folder in the folders list. Click New and the click Folder - On the command bar, click New Folder - Right-click any blank area in the Contents pane. Click New and then click Folder

Spyware includes the collection of

- keystrokes -passwords - confidential information

what is true about passwords

- the term passwords and key are synonymous for passwords - passwords can be used to secure computers, networks, software, personal accounts, and digital devices

Select what's true regarding uninstalling software

-Be cautious when uninstalling software from the computer manufacturer -Be cautious when uninstalling software from the OS manufacturer. -Uninstalling system software is not recommended.

Optical drives

-Blu-ray player - DVD drive

Select the true statements regarding Instagram.

-Instagram is a photo sharing app that is available for download to a variety of digital devices.

Common symptoms of a computer virus infection include

-OS doesn't launch properly. -files get deleted or encrypted. -strange error messages or pop-up ads.

Select the advantages of using cloud storage.

-Redundancy - data is stored on multiple servers. -Availability - data can be retrieved by any Internet-connected device.

other computer term

-Software Theft -First Party Cookies -Hardware Theft

Select the qualities that make a trait useful for biometic recognition.

-The trait must be measurably different with each person. -The trait must not change over time.

Advantages of using a USB drive instead of a DVD

-USB drive has shorter access time -USB drive is more durable

Select what's true about passwords.

-Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. -Regularly check your accounts to ensure they have not been tampered with.

Select what's true about the privacy risks with cookies.

-Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.

Which would be used to store a single bit of data?

-a transistor -a hole in a punch card -a program

You can change your Firefox settings to allow you to

-approve cookie storage requests. -deny cookie storage requests. -delete stored cookies automatically when you start Firefox.

There are a variety of cookie settings that can be adjusted in Google Chrome including

-blocking/allowing cookies by default. -deleting cookies -making exceptions for cookies from specific websites or domains.

Common internet transmission media

-coaxial cable -telephone wire - cell phone radio eaves

Identify common symptoms of a computer virus.

-documents won't save -computer runs extremely slowly -programs launch on their own

identify common symptoms of a computer virus

-documents wont save -computer runs extremely slowly -programs launch on their own

which of the following statements are true? (dvd and blu ray)

-dvds and blu rays are considered optical media -dvds use longer wavelength (red spectrum) lasers

true about spyware

-includes the collection of keystorkes, passwords and confidential info -intstalled via free downloads or by visiting certain illegitimate websites -collects info about your internet surfing habits and behaviors.

Rootkits allow a remote user to do which of the following.

-install rogue files -create backdoor programs -delete files

Which of the following are considered cybercrimes?

-internet scams -cyberespionage -information theft

singler event

-keystorke logger -trojan horse -phishing

true about packet sniffers

-legitimate sniffers are used for routine examination and problem detection -unauthorized sniffers are used to steal info.

characteristics of fiber optic lines

-made of 1 or thousands of fibers - high-speed transmission

choose the samsung galaxy tablet options

-note series -tab series

select the characteristics of a plotter

-prints large graphic displays -mechanically moves a pen over a large sheet of paper

Which of the following are common email viruses.

-ransomware -keystroke logging Trojan

Select the reasons to compress a file.

-reduce storage space requirements -reduce bandwidth needed to transmit a file

select the characteristics of a onedrive account

-requires a microsoft email account -provides free cloud storage -can serve as extra storage space

Select the characteristics of computer storage.

-retains data when power is turned off -sometimes referred to as secondary storage

Which of the following are online nuisances?

-spam -spyware -spoofing

select the usual tasks of information systems (IS) program managers

-supervising IS technicians -working with developers and senior management to procure and implement IS processes -develop training plans and policies for IS

Important considerations when purchasing a new tablet computer include

-the amount of RAM it has. -the size of its screen. -the amount of storage it has.

Select the statements that refer to the term "dot pitch".

-the closer the spacing (the smaller the dot pitch) the sharper the image -the diagonal measurement of the visible display

select the advantages of using a USB instead of a dvd

-usb drive has shorter access time -usb drive is more durable

Select the characteristics of a traditional hard drive.

-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters

what should you consider when buying a new computer?

-what is the cost? -does it have hdmi ports? -does it have an sd card slot?

virus

-you cannot boot your computer -your computer is running slower than usual.

which of the following file extensions is commonly used for term papers and other word processing tasks?

.docx

Select the characteristics of audio output

1)converts electrical impulses into air movement 2)Digital devices use digital-to-analog converters

Put the steps of the boot process in the correct order

1. The device is powered on and the CPU activates BIOS 2. The power-on self-test is executed 3. The OS is loaded into RAM 4. The OS checks the registry settings and loads saved configuration settings

1. Online nuisance 2. Other computer terms

1. Trolling Phishing Spoofing Spyware 2.Hardware Theft Software theft First Party cookies

1. Hacker 2. Online nuisances

1. White hat Black hat Cyber terrorist Script Kiddie 2.Spam Spyware Adware

1. CTRL+B 2. CTRL+A 3. CTRL+X 4. CTRL+C

1. bold 2. select all 3. cut 4. copy

Rank in order of size with the smallest on top

1. byte 2. megabyte 3. gigabyte 4. petabyte

put the steps for adjusting cookie settings in proper order

1. choose safari 2. click preferences 3. click privacy 4. change cookie settings

1.Command+A 2.Command+Shift+3 3.Command+S 4.Command+F

1. select all 2. screenshot 3. save 4.find (in most apps)

setting restriction in MAC OS

1. select system 2.click 3.select a user

what is the correct order of steps to use when uninstalling a program in windows 8 using the search feature?

1. swipe to the right 2. click search 3. type control panel 4. under view by select large icons

Blu-rays provide approximately ___ of storage space.

25 GB

most new laptop computers come with how much storage?

256gb - 1 tb

Capacity of a DVD

3-5 GB

Where in the image above would you click to download a copy of your facebook data

4 triangle

Most new laptop computers come with how much storage?

4-8

When you buy a new laptop, how much RAM should it come with?

4-8 GB

when you buy a new laptop how much RAM should it come with?

4-8gb

the item that uses approximately 1 terabyte of data

40 Blu-ray movies

A typical laptop has a storage capacity of approximately ____ .

500 GB - 1 TB

Capacity of a typical laptop

500 GB- 1 TB

Laptop

500 GB- 1 TB

most new cell phones today come with approximately ____________ of RAM

500mb-2gb

black

A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

keystroke

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Script Kiddie

A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. Script kiddies try to illegally gain access to computer systems using programs (scripts) that others have written. Script kiddies do not have the skill or experience to write their own programs to gain illegal access to computer systems.

Keystroke logger

A keystroke logger is a form of spyware that records all actions typed on a keyboard. Can be hardware devices and software applications Software based keystroke loggers are often a Trojan that is installed without the user's knowledge. Keystroke loggers can record passwords and confidential information.

Macro Virus

A macro virus is a virus that is written in a macro language and placed within a document or spreadsheet. When the document or spreadsheet that has been infected by a virus is opened and the macro is executed, commands in the macro language set off the destructive events that the virus was designed for.

Pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings. 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.

According to Microsoft, what is the correct order of steps for deleting cookies in Internet Explorer (Microsoft Edge)?

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

Active pixel sensor

_________ use technologies have resulted in many hands-free devices

Adaptive

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.

Adware

Adware

Adware is software that collects the user's web browsing history. This data is collected then used to create unsolicited targeted pop-up advertisements. Adware often accompanies downloaded programs.

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ______ generation subsystem

Application

The width of a screen compared to the height of a screen is referred to as __________.

Aspect ratio

Using extremely low power radio signals, short-distance wireless connections are often made using ________ technology.

Bluetooth

A group of compromised computers controlled by a hacker is called a

Botnet

______ is an eight-bit character coding scheme used on many larger systems. A)ASCII B)Unicode C)EBCDIC D)Hexadecimal

C)EBCDIC

Which optical drive media stores approximately 700 MBs of data?

CD

shortcut for "select all"

CTRL + A

After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data

Click - Remove All Website Data

You need to adjust cookie and data permission settings in google Chrome. Put the steps for adjusting cookie and site data permission settings in Goggle Chrome in the correct order.

Click the Chrome menu Click show advanced settings In the "cookie"

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Cookie

session cookies

Cookies that are held in temporary memory and used to analyze and measure traffic on a Web page are called ___ cookies.

A deliberate misuse of computers and networks via the uses malicious code to modify the normal operations of a computer/network

Cyberattack

The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.

Cyberattack

_______ is the term used for 1024 bytes using the binary system. A)Terabyte B)Gigabyte C)Megabyte D)Kilobyte

D)Kilobyte

though it could theoretically hold terabytes of data for thousands of years in microscopic, ___ storage, using genetic material, is a distant storage option

DNS

Printer manufacturers advertise the quality of their products by stating how many ___ they produce.

DPI

Printer manufacturers advertise the quality of their products by stating how many ____ the produce

DPI (dots per inch)

Internet service that tends to provide the most consistent speeds is

DSL

A type of camera that allows you to look directly through the lens is a ______ camera

DSLR

__________ is one of the most difficult parts of the PDLC process

Debugging

There are a variety of cookie settings that can adjusted in Google Chrome including

Deleting cookies Blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains

A DDos attack is when a computers that have been infected by a virus act as "zombie" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for

Distributed Denial of Service

DDos

Distriute Denial of service

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ___ attack

DoS

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a

Dos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called

Dos attack

The distance between two adjacent sub-pixels on a display is referred to as _______ pitch.

Dot

Using a stylus and touchpad to mad the signature and measure pressure, pen angle etc. is called ________ signature recognition

Dynamic

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

What technology allows for the electronic communication of business-oriented transactions and information between people and organizations?

EDI

Megahertz

Equal to one million cycles (or instructions) per second

Hertz

Equals one cycle (instruction) per second

A quick way to rename files or folders in Windows is to select the item and then press the _____ key

F2

An efficient way to manage your files in Windows 10 is to use the _____. - Office menu - Office explorer - file explorer - start button

File explorer

computer hardware and software that an organization uses to increase its performance is referred to as its _____________

IT system

A program that makes creating websites and webpages much faster is ___ .

JavaScript

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Keystroke

Refers to a type of monitor display

LCD

the two most common audio files formats are WAV and ___

MP3/MP4

NFC

Near Field Communication A short range wireless technology used for data transfer and electronic payments

the technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

Safari accepts cookies and websites data from which of the following

Only from websites you visit

Select the 3 main ways of detecting and recording fingerprints.

Optical - takes a photo of the fingerprint.

An input, output or storage device connected to a computer is known as a(an) _____ .

Peripheral

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

Pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

Pharming

Pharming

Pharming is a type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer. The malicious software redirects the user to a phony web page, even when the correct web address is used. When the user has reached the fake webpage they are prompted to enter their username, password, and other sensitive personal information.

Which of the following describes phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving up private information

This type of display creates images with pixels made of red, green, and blue cells filled with ionized gas.

Plasma

Uses microscopic tubes of ionized gas to create displays.

Plasma

Using cells of ionized gas to create images, _____________ displays are actually becoming less popular.

Plasma

A type of printer that is used to print large graphic images such as blueprints by mechanically moving a pen over a large sheet of paper

Plotter

Which of the flowing are symptoms of an online nuisance attack?

Pop up start appearing after you visit unfamiliar sites Frequent pop ups awhile searching the web or working in programs Receiving a lot of spam message or bounced back email messages

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file if will sent the file to an isolated area on the hard disk called

Quarantine

Because of their capability of storing data in multiple hard drives, data warehouses use _____ technology to ensure redundant data storage

RAID

Refers to a type of data storage

ROM

What does RFID stand for?

Radio Frequency Identification

One version of this malware encrypts the victims data until a payment is made.

Ransomware

Number of times per second a frame in a video is advanced is the definition of frame ________.

Rate

An internet filter is firewall software used to block a user's access to specific internet content. An internet filter can be installed on which of the following

Router Computer Server

most tablets and phones use ________________ as their main storage device

SSD

Because they have no mechanically moving parts, ______ provide extremely fast, efficient storage

SSDs

because they have no mechanically moving parts, ___ provide extremely fast, efficient storage

SSDs

If you want to save a file to a particular folder or site on your computer (such as the Documents folder or your desktop, be sure to click File and then select ___ in the File menu. - Save As - Save - Keep - File

Save as

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

Sniffers

virus

Software that infects a computer and is created using computer code is called a computer _____.

This is the Windows Firewall area where you can adjust various firewall settings. Put the steps that allowed yo uto get to the screen correct order

Start button Control panel System and Security Windows Firewall

Phishing

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ___.

Checking the hard drive on a device using Windows 10 can be done using the _______ app

This PC

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars

True

The Bit Torrent protocol allows members to share large files over the Internet

True

The mobile switching station can connect calls to mobile switching station belonging to other cellular networks

True

You must individually adjust cookie settings in every browser you use

True

How do firewalls work?

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. •There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including packet filters and a proxy server. A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules.•Proxy Server -Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network

Spam messages are sometimes referred to as ______

UBE

spam messages are sometimes called ---- and are used for a variety of marketing purposes including selling products and services

UBE

spam messages are sometimes called ___ and are used for a variety of marketing purposes including selling products and services

UBE

What type of port do most digital devices use to attach peripherals?

USB

Which of the following are widely used tactics that can help keep you safe on the Web

Use your browser's private browsing mode Consider using a VPN Make sure the sites you visit use HTTPS

Persistent cookies store information about _____.

User preferences

Most smartphones and tablets have _________ (touchscreen) keyboards.

Virtual

1. data manipulation 2. data corruption 3. cyberbullying

Which of the following are considered cybercrimes?

White Hat Hacker

White hat hackers are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___

active pixel sensor

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

active pixel sensor

the width of a screen compared to the height of a screen is referred to as _____________

aspect ratio

Select the input devices often found at a point-of-sale station.

bar code or UPC reader receipt printer

Cell towers are connected to

base transceiver stations

cell towers are connected to ___________

base transceiver stations

Inkjet printers are often sold ____ their production cost.

below

optical storage media: capacity of up to 50gb (per side)

blue-ray

Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.

bluetooth

a short-range wireless transmission protocol is known as _____________

bluetooth

A group of compromised computers controlled by a hacker is called a

botnet

Using online servers to store data is called ___ storage

cloud

the amount of data that defines each color in a pixel is called _____________

color depth

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

computer

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

contrast ratio

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

design

The distance between two adjacent sub-pixels on a display is referred to as ___ .

dot pitch

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

english

The final step in the system development life cycle is maintaining the system. Select the two phases of this step.

evaluation phase training phase

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a

firewall

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a _____________

firewall

To control how information is entered into a database, programmers and database administrator create ______ to help ensure data integrity

forms

A desktop computer's RAM is measured in?

gigabytes

A laptops computer's memory capacity is measured in ___ of data

gigabytes

Most laptops have hard drive capacities measured in ___ or terabytes

gigabytes

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called

hacker

a category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purpose is

hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ______ instead of air

helium

all of the following are true about RFID except

high frequency RFID can transmit signals further than 1500 ft

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage technology to retain petabytes of data within 1 cubic inch of space

holographic

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location

holographic

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

holographic

Third party apps must be reviewed and approved by Apple before being available for the

iOS

For ______ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot then to add wired Internet service

individual users

adding software to a digital device, or adding hardware components to a digital device is called ________________

installing

black hat hackers

intent to be mean sad face

firewall software used to block a user's access to specific internet content is called a ___ filter

internet

firewall software used to block a users access to specific internet content is called a(n) _____________ filter

internet

international law

internet

a program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C#____________

interpreter

The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.

investigation

while many third party apps are available through its app store, apps for _____________ must first be tested and approved before theyre made available for downloading

iphones

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

form of spyware that records all actions typed on keyboard

keystroke logger

A short email uses about a

kilobyte

A short email uses about one ___ of data.

kilobyte

A short email uses about one ______ of data

kilobyte

android OS released in 2014

lollipop

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

file compression: reduces space required by reducing redundancy within files

lossless

because it reduces an audio file's sampling rate to save space, the MP4 format is a ___ compression format

lossy

what is the name of a virus written in macro language and placed within a document or spread sheet

macro virus

A large ___ can remove data from a traditional hard drive, but won;'t hurt a Blu-ray disk

magnet

Be careful to ony open email from senders you know and trust. ________ may be contained in email messages

malware

when referring to business information technology, MIS stands for ______________

management information systems

Experts suggest using password _ software to keep your passwords safe

management software

one of the largest data requirements of the future will likely be ___________

mapping patients genomes

the most common audio input device is a

microphone

the standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or ________________

netiquette

two common categories of cybercrimes include single events and _____________ series of events

on-going

A storage device that uses lasers to read CDs, DVDs, or Blu-ray Discs is referred to as a(n) ___ drive

optical

Blu-ray disks and DVDs are ___ media

optical

DVDs, Blu-rays and CDs are examples of _______ media storage

optical

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

Using reflective material to store data that can be read using a laser is called ___ media storage.

optical

A storage device that uses laser to read CDs, DVDs, or Blu-ray Discs is referred to as a(n)

optical drive

Storage device that uses lasers to read CDs, DVDs, or Blu- ray discs is referred to as an _____

optical drive

Select the storage devices.

optical drive external hard drives USB drives

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

optical drives

which area of the control panel screen in windows 7 allows you to adjust parental control?

other users

A secret code used to help prevent unauthorized access to data and user accounts is called a

password

An input, output or storage device connected to a computer is known as a(an) _____ .

peripheral

stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as ___ cookies

persistent

stored on a user's hard drive, a type of cookie that collects info. about user preferences, password and username info, ip address and data on web surfing

persistent cookie

What are the current uses for RFID tags

pet identification, package tracking, and inventory tracking

Rank the storage capacities from highest to lowest:

petabyte terabyte gigabyte megabyte kilobyte

server banks have capacities measured in

petabytes

a type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

pharming

type phishing that seeks to obtain personal info through malicious software that

pharming

illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a blank, or insurance company is called

phishing

highlight(llegitmate use of an email message collect personal inforamation

phisihing

the smallest element of an image is called a(n) _________

pixel

Select the output devices.

printers

Converting a task into commands that a computer can use to perform the task is called ___ .

programing

Adware often accompanies downloaded

programs

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control on the network is called _______ software

remote desktop

A worm that is a type of malware that _ itself throughout a single computer or across a network

replicates

a worm is a type of malware that ___ itself throughout a single computer or across a network

replicates

The number of pixels in an image is called the image's ____ .

resolution

The number of pixels in an image is called the image's __________.

resolution

if you accidentally delete a file it's not lost forever! just go to your recycle bin, select the item and click _______________

restore

To access an app's Jump List, just ___ on the app's icon in the taskbar. - right-click - double-click - drag across - click

right-click

To open the shortcut menu inside the Documents folder, just ___ in any open area of the Documents window. - double-click - click - right-click - scroll

right-click

Software programs that hide in the operating system & allow for the installation of hidden files

rootkits

Your _____ can provide hardware firewall protection for your home network where it connects to ISP's network, just as ISP networks have firewalls where they connect to the Internet

router

the device that connects 2 networks is a ____________

router

Computer viruses typically must be ---- to attack and do damage. viruses can destory programs/ alter the operations of a computer/ networks

run

if you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___ mode

safe

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in

safe mode

which of the following are internet service options?

satellite, cable, fiber optic

command+s

save

storage

saving a file to the cloud

The diagonal measure of the visible display is known as _______.

screen size

command+shift+3

screenshot

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____

script kiddies

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________

script kiddies

The item that comes in capacities measured in petabytes

server banks

What type of cookie is stored in temporary memory and is lost when the web browser is closed

session

stored in temporary memory, ----- cookies are used to analyze and measure

session

stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page

session

what type of cookie is stored in temporary memory and is lost when the web is closed?

session

Rather than going through the Control Panel, an easy way to change your system settings in Windows 10 is to open Cortana and type ___ in the search window. - modify - settings - help - changes

settings

The item that uses approximately 1 kilobyte of data

short email

In general, the ___ the access time, the faster the hard drive

shorter

In general, the _____ the access time, the faster the hard drive

shorter

Increased data transfer will be less likely to have errors if you use a ___ USB cord.

shorter

this is the settings area of google chrome. where would you click to adjust cookie and site data permissions?

show advanced settings

the software code of a particular computer virus is called the virus

signature

anitiviruses programs uses a variety

signature heuristic

Specialized hardware of software that capture packets transmitted over a network called packet

sniffers

Specialized hardware or software that capture packets transmitted over a network are called packer

sniffers

specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

specialized hardware or software that capture packets transmitted over a network are called packet ____________

sniffers

unsolicited email is

spam

Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a

spam filter

computer software that is designed to prevent spam messages from entering into a user's email inbox

spam filter

While not a required step in sending an email, it's wise to _____ any message before clicking send

spell check

select the output devices

television, printers, keyboards

A thousand gigabytes equal 1 ___

terabyte

Bus width

the amount of data that can be transferred at a given time

converts electrical impulses into air

the characteristics of audio output

Where is the "Show Desktop" button on Windows 10? - in the File menu - on the Quick Access toolbar - the extreme right of the taskbar - in the Office menu

the extreme right of the taskbar

select the qualities that make a trait useful for biometric recognition

the trait must not change over time, everyone must have the trait, and the trait must be measurably different with each person

commonly used for reciepts

thermal printer

A kilobyte is equal to approximately one _____ bytes.

thousand

to create an image with a laser printer _____________ is(are) drawn to the drum

toner

USB drives special ___ to store information

transistors

To select a paragraph in a word processing program is usually as easy as ___ the left mouse button. - double-clicking - triple-clicking - clicking - dragging

triple-clicking

3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.

true

A computer platform is commonly referred to as an operating system or OS

true

A computer platform is commonly referred to as an operating system or OS.

true

Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today.

true

Applications are computer programs created to execute specific tasks.

true

Many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos.

true

The Android OS is owned and maintained by Google (Alphabet).

true

click on the organization below that you should contact if you receive a phishing message

us-cert

Web server

used to control access to resources on the web

Network server

used to control access to resources such as printers and applications on a network

Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device

virus

A camera that takes photos or steams video into a computer or over the Internet is called a ___ .

webcam

One risks with cookies is

websites using cookies can collect your information and sell it to third parties

it equals the number of pixels in a display and measures image quality

which are true regarding a screen's resolution

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

A destructive program that replicated itself throughout a single computer or across a network is called a ______

worm

A detractive program that replicates itself throughout a single computer or across a network is called a

worm

T or F? Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today

True

Single event

Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud.

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them

$50

Image compression formats

- JPEG -PNG

3 items needed to install a home WiFi network

- an internet signal -a modem - a router

single event cybercrimes

- phishing - Trojan horse - keystroke logger

cyberattacks

- rootkit - packet analyzer - DOS attack

CDs

- used for music albums - store roughly 700 MB

Cell phone manufacturers

-Blackberry -Xiaomi -Huawei

Which would be used to store a single bit of data?

-a transistor - a hole in a punch card

A single letter uses approximately how many bytes of data?

1 byte of data

Select output devices

1) tv 2) printers

you need to adjust cookie and data permission settings in Google chrome

1)click the chrome menu on the browser toolbar then select settings 2) click show advanced settings. in the privacy section , click 3) in the Cookies section change the desired cookiest settings.

1. CTRL+V 2. CTRL+P 3. CTRL+Z 4. CTRL+S

1. Paste 2. print 3. undo 4. save

Microsoft recommends when that you create passwords with upper and lower case letters, numbers, symbols, and use at least ___ characters. - 8 - 6 - 10 - 4

8

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

Trojan

A program that appears legitimate, but executes an unwanted activity when activated. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps.

Cookie

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Email virus

A virus that is attached in a file and sent via e-mail.•When the infected file is opened, the virus infects the computer. •Phishing -tricks users into revealing usernames and passwords by appearing legitimate. Ransomware -when activated, encrypts files on user hard drive and then sells a decryption program.•Keystroke logging Trojan -when activated, saves all keystrokes for subsequent transmission to virus creator.

macro

A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.

Business owners, copyright holders, and network administrators publish _____ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

AUPs

Equipment and technology that allows users to input data into a computer without the use of a traditional keyboard and mouse or touchpad is referred to as _________________.

Adaptive use

Where can you type your question to search for files, folders, and apps in Windows 10, along with searching the web and interacting with Cortana? - Alexa Now window - Google Plus window - Ask me anything. window - Siri window

Ask me anything window

In the binary numbering system, 8 bits constitute a byte. A _____is half a byte. A)base 2 B)nibble C)binary digit D)exabyte

B)nibble

Judy wants to purchase a Blu-ray Disc that can be recorded on multiple times. She should choose discs that are labeled

BD-RE

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.

Barcode

the coding step of the PDLC might use which of the following languages?

C++

Put the steps to change safari cookie

Choose safari Click Preferences Click privacy Change cookie settings

The number of bits of data describing each pixel in a display is referred to as ___ .

Color depth

To adjust your Windows computer's time and date settings, it's often easiest to go to the ___ panel. - Availability - Settings - Control - Coordination

Control

Every gaming console uses a specific input device called an ___________

Controller

CTRL+X

Cut

Number of times per second a frame in a video is advanced is the definition of ___ .

Framerate

According to US-CERT if you receive a phishing message you should contact them using which of the following method

In Outlook Contact the via the phone number

Firewall software used to block a user's access to specific internet content is called a

Internet filter

A ________ allows programmers to convert source code line-by-line

Interpreter

current uses for RFID tags

Inventory tracking, package shipment tracking, and per identification

6 steps of SDLC:

Investigation Analysis Design Development Implementation Maintenance

An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .

Java

______ is an object-oriented programming language that is popular when writing Android apps

Java

Windows 10 allows you to right-click on a app's icon in the taskbar and have a menu of options. It also shows you the most recent files you've had open in the app and allows you to "Pin" items. This menu is called a ___ . - Option Menu - Choice Button - Quick Access Menu - Jump List

Jump List

Select what is true regarding keystroke loggers

Keystroke loggers can record passwords and confidential information Can be hardware devices and software applications Software based keystroke logges are often a Torjan that is installed without the user's knowledge

Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of

Keystrokes Passwords Account numbers

By efficiently turning electrons into photons, _____ backlit displays provide very bright screens with very little energy

LED (light-emitting diodes)

What are the acronyms for types of computer monitors?

LED and LCD

Lower range tones generally require ___ speakers.

Larger

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.

MEMS

the technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____________ chip

MEMS

_______ are mini-programs that allow you to program easily by streamlining processes

Macros

Malware

Malware is short for malicious software. Malware is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Malware includes a variety of programs including viruses, worms, and Trojan horses.

By upgrading to it's maximum capacity of 16 GB of RAM and 1 TB of storage, the _______ tablet could be an extremely powerful computer

Microsoft Surface Pro 4

by upgrading to its maximum capacity of 16gb of RAM and 1tb of storage, the ________________ tablet could be an extremely powerful computer!

Microsoft surface pro 4

The technology that musicians often use to connect their instruments to computers is _________.

Midi

Select what's true about fee based and free antivirus software

Most fee base software comes with technical support One with positives of free anti virus software is their malware detection performance

A link between tables in a relational database that defines how the data is related is called a

Relationship

The number of pixels in a display is called the display's ___ .

Resolution

The number of pixels in an image defines the pictures _________.

Resolution

The number of pixels in an image is called the image's ____ .

Resolution

Software programs that hide the operating system and allows for the installation of hidden files are called

Rootkits

CTRL+S

Save

Diagnosing a hacked system

Signs your system might have been hacked include: Fake antivirus messages - If you notice these messages, power down your computer and reboot your computer in safe mode. In safe mode run your anti-virus program. Unwanted browser toolbars. Frequent random fake emails or social media messages from your account.

Web cookie First party cookie Third party cookie

Small test file of information created by websites you visit that your web browser stores on your hard disk Small test file of information created by a website you visit that keep track of your personal preference and the current web browsing session Small test file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Avoiding Viruses

Some ways to help avoid viruses include downloading and installing the latest antivirus software and installing and running a firewall. Other ways to avoid viruses include only downloading software from trusted sites and only visiting trusted websites.

on-going

Two common categories of cybercrimes include single events and _____ series of events.

Flash drives or thumb drives are common names for ___ drives

USB

Most peripherals connect to a computer uses a _______ port.

USB

Most smartphones and tablets produced today use a _____ keyboard.

Virtual

Software that infects a computer and is created using computer code is called a computer _____.

Virus

A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.

Visual

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to enormous vulnerabilities) was knowns as ______

WPA

the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as _______________

WPA (wired equivalent privacy)

In addition to activating _______ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected

WPA2

in addition to activating ___________ protection, it's a good idea to disable your routers SSID transmission once all your devices are connected

WPA2

macro virus

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.

White Hat Hackers

A destructive program that replicates itself throughout a single computer or across a network is called a

Worm

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

Zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

Bus

a channel over which information flows in a computer

CDs store data using

a reflective coating that has pits and lands

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___.

active pixel sensor

transaction

business to consumer

Eight bits are considered to make one ___ of informational. In ASCII, it is the data required to store one character, such as a letter or a number

byte

In ASCII, eight bits=one ______

byte

One character of information, for example, a letter or a number consists of one ___ of storage

byte

One disadvantage of cloud storage is that

data is only available when you're online.

fuction session cookie

determine determine analyze

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym DDoS stands for

distributed denial of service

trojan malware

doesn't replicate themselves

optical storage media: capacity of up to 8.5 gb

dvd

which of the following are considered storage media?

dvds, blu ray disks

a virus is attached in a file in and sent via email message is called a ___ virus

email

designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display

extensible markup language

When you receive a file, you can tell what type it is by its ___ . This is a dot and 3 or more characters after the file's name. - extension - title - definition - description

extension

In general, game controllers can be interchanged between different types of gaming consoles.

false

T or F? Game controllers can be interchanged between different types of gaming controllers

false

after the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ____________ and is written in an ordinary language, such as english

flowchart

in order to keep your files organized, its a good idea to create __________ and place your files in them

folders

Number of times per second a frame in a video is advanced is the definition of ___ .

frame rate

Number of times per second a frame in a video is advanced is the definition of _____.

frame rate

Number of times per second a frame in a video is advanced is the definition of ___________.

frame rate

The term that describes how fast each pixel in a display is updated is _____.

frame rate

number of times per second a frame in a video is advanced is the definition of ____________

frame rate

which of these devices are manufactured by samsung?

galaxy, note

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

generation

Most laptops have hard drive capacities measured in ____ or terabytes

gigabytes

a desktops computer RAM is measured in _____________ of data

gigabytes

what is equal to one cycle per second?

hertz

using refracted laser light to store data on a photoreceptive substrate is essentially how ____________ storage works. Theoretically this could store gigabytes of date within a cubic millimeter

holographic

Apple's mobile device with the largest display is the

iPad Pro

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .

information systems (information technology) technician

uses ink cartridges

inkjet printer

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

Which of the following represents the least amount of storage?

kilobyte

DVDs have pits and lands that absorb or reflect a ___ beam. DVDs can store approximately 4.5 GBs of data (single layer)

laser

Image compression format of GIF

legacy (outdated) lossless format

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives

longer

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

longer

match the business information system (IS) activity with the appropriate manage level: use IS for record keeping and reporting purposes

middle managers

Megahertz is equal to one _____ cycles (or instructions) per second.

million

a megabyte equals approximately one _____________ bytes?

million

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

The only disadvantage of a solid state drive rather than a traditional (magnetic) hard drive is that the solid state technology is ___

more expensive

Image compression format of PNG

most popular lossless image compression format

Image compression format of JPEG or JPG

most popular lossy image compression format

capacitance

most touch pads use _to sense when a finger has moved across the pad

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

safari accepts cookies and website data from which of the following?

only from websites you visit

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources

computers viruses typically must be ___ to attack and do damage. viruses can destroy programs or alter the operation of a computer or network

opened

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

what manages hardware and software, supports the computers basic functions, and runs programs?

operating system

which of the following are used to take fingerprints

optical, capacitance, ultra-sonic

The BitTorrent protocol is often called ______ file sharing

peer-to-peer

where would you click in the view page info screen in Mozilla Firefox page that allows you to access the area that allows you to block cookies

permissions

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

A type of phising that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called

pharming

creating a fake webpage to trick victims into divulging personal info. is a type of phishing

pharming

The illegitimate use of an email message that is sent to collect personal information and appears to be from an establish organization such as a bank company is called

phishing

Blu-ray stores data using ___ .

pits and lands that are read by a blue spectrum laser beam

The smallest controllable element of an image is called a(n)___ .

pixel

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .

plotter

used for drafting or blueprints

plotter

To create a reminder in Windows 10, click Cortana, then select the light bulb, and then click the ___ sign. - dollar - plus - bell - speaker

plus

All of the following are best practices when using LinkedIn except

post vacation photos to show your friends where you've travelled.

adware often accompanies downloaded

programs

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

projective capacitive

An output device that uses light to display video or image output on a surface is called a ___ .

projector

DMCA signed two

property organization

What type of server intercepts all messages between client and a server to help avert a hacker or other intruder from attacking a network

proxy

what type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network

proxy

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.

pseudocode

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ______

quarantine

in 2017, wanna cry infected nearly 250,000 computers in one day. in malware encrypted victims data files and demanded payment for decryption code. this type of malware is called

ransomware

one version of this malware encrypts the citims data until a payment is made.

ransomware

which colors typically make up a monitor's pixels?

red, green and blue

With optical zoom, resolution ____ when focusing on distant objects.

remains the same

SDLC

software development lifecycle

ted installs computers software designed to prevent spam messages from entering his email inbox. this type of software is called a ___ filter

spam

The component of a computer that allows data to be retained after power is turned off is referred to as

storage

The component of a computer that allows data to be retained after power is turned off is referred to as ____

storage

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

the component of a computer that allows data to be retained after power is turned off is referred to as ____________

storage

Most desktop computers come with a traditional hard drive to ___ data

store

highly mobile device that can be used while standing or even walking

tablet computer

A programming design that breaks down a problem into a series of tasks is called ___ programming.

top-down

connsidered intellectual

trademarks patents trade secret

Phishing

tricks users into reveling usernames and passwords by appearing legitimate.

You must individually adjust cookie settings in every browser you use.

true

UltraHD

tv displays with resolutions of at least 3840 x 2160 are referred to as _

USB flash drive

used to store data

Persistent cookies store information about

user preferences

The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.

video conferencing

most smartphones and tablets produced today use a ___________ keyboard

virtual

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

A computer controlled by a hacker is called a

zombie

A computer controlled by a hacker is called a _____.

zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

zombie

if your debit card has been compromised US federal law says you are only liable for a maximum of ________________ in fraudulent charges if you tell your bank within two business days of learning about them

$50

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

$500

if your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to ______________

$500

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to ______

$500dig

What are the technologies used by facial recognition software.

- 3D mapping - Skin texture measuring - Feature charting

Select the technologies used by facial recognition software.

- 3D mapping - feature charting - skin texture analysis - capacitance analysis

Advantages of using a database instead of a traditional filing system

- A database can hold longer amounts of data - A database can provide better data integrity

Video file compression formats

- AVI -MP4 -QuickTime

List the characteristics of a projector

- Allows large audiences to view digital output - Usually used with a screen - Usually requires a darkened environment

True regarding a Wi-Fi's SSID

- An SSID is the Wi-Fi's name - Most routers transmit the SSID every few seconds so roaming devices can find the signal -In the home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary

Tablet computers

- Apple iPad - Samsung Galaxy NotePRO -Amazon Fire HD

Storage

- Blu ray disc - Solid State Drive (SSD) - USB drive - Read Only Memory (ROM)

select the optical drives

- Blu-ray player -DVD drive

Which colors make up a typical monitors pixels.

- Blue - Green - Red

Optical Media

- CDs - uses layer to read/write data - blu-ray discs - DVDs

Cyberattacks include

- DDoS attacks - identity theft

select the disadvantages of using cloud storage

- Data is only available if you are online - Data stored on someone else's server can be accessed by anyone who had administrator privileges to the server

Disadvantages of using cloud storage

- Data stored on someone else's server can be accessed by anyone who has administrator privileges to the server - data is only available if you're online

USB Drive

- Durable - Also called a "thumb drive" or a "flash drive" - "uses electronic circuits to store data - very fast

Which of these should business owners do to help protect their data?

- Establish strong firewall protection for their business's network - Ensure antivirus software is installed and up-to-date - create strong password protections and protocols

List Input Devices

- Game controller - Keyboard - Microphone - Mouse

MEMS chips are used in which of the following?

- Hearing Aids - Smartphones

Characteristics of a Blu-ray Disc

- Holds approximately 25 GB of data - Uses pits and lands to store data

true regarding IP addresses

- IP stands for Internet Protocol - In most home networks IP addresses are assigned by the Internet Service Provider - If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address

List some Peripherals.

- Keyboard - Printers

List the acronyms that describe a type of computer monitor.

- LCD - LED

List common printer manufacturers.

- Lexmark - HP - Canon - Brother

computers infected with a virus exhibit many symptoms including

- OS does not launch properly - files get deleted or encrypted - strange error messages or pop-up ads

Common symptoms of a computer virus infection include

- OS doesn't launch properly - files get deleted or encrypted - strange error messages or pop-up ads

Memory

- Random Access Memory (RAM) - Processor registers - L3 Cache

Advantages of cloud storage

- Redundancy - Availability

List Output Devices

- Speaker - Printer - Monitor - Projector

Blu- ray discs

- Stores roughly 25 GB - Used to store HD movies

Usual tasks of information systems program managers

- Supervising IS technicians - working with developers and senior management to procure and implement IS processes - Developing training plans and policies for IS

Which is true regarding a displays refresh rate?

- The higher the refresh rate, the smoother the video - Describes how fast each pixel in a display is updated - Videos play best with refresh rates at even multiples of the frame rate

virus

- Trojan horse - worm - macro

List the input devices often found at a point-of-sale station.

- UPC scanning wand - Keypad - Bar code or UPC reader

The characteristics of a DVD

- Uses pits and lands to store data - Holds approximately 4.5 GB of data

Audio file compression formats

- WAV -MP4

What's true about database fields

- a group of related characters in a database -Represent a characteristics of someone or something -Primary key is a field designation

cookies settings you can adjust in Internet Explorer (Microsft Edge)

- allow cookies -delete cookies -block cookies

identify what is true about script kiddies

- amateur computer hackers with the little programming expertise - illegally gain access to computer systems using programs (script) that others have written

Functions of Mobile Switching Stations

- assigns frequencies to your calls - sends your call to the receiver's MSS -changes the cell and base station your transmissions go through as you travel

the advantages of using cloud storage

- availability; data can be retrieved by any internet connected device - Redundancy; data is stored on multiple servers

When reporting ethics violations of a co-worker to your employer, it's important to ______

- be brief and direct -state only what you witnessed

on-foing series of events cybercrimes

- blackmail - cyberstalking

true regarding dual band routers

- can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals int eh 5.0 GHz frequency range - minimizes the impact of interference from microwave ovens and car alarms

Usual tasks of a data analyst

- collects data -interprets information provided by the database - creates reports for senior management

Characteristics of a router

- connects networks -provides hardware firewall protection -usually incorporates a switch

If you believe you have fallen victim to a phishing scam you should

- contact the institution the message was allegedly sent from - contact US-CERT

the privacy risks associated with cookies

- corporate and government entities can track your web behavior - websites can track your surfing behavior and create a profile - websites using cookies can collect your information and sell it to a third parties

you can change your Firefox settings to allow you to

- delete stored cookies automatically when you start Firefox -Approve cookies storage requests -Deny cookie storage requests

you can change your Firefox settings to allow you to

- deny cookie storage requests - delete stored cookies automatically when you start firefox 0 approve cookies storage requests

select the characteristics of desktop computers:

- desktops allow for relatively easy upgrade and expansion -desktops are often used in offices since they dont need to be mobile -desktops use a full OS

the functions of session cookies

- determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used

common symptoms of a computer virus

- documents won't save - computer runs extremely slow - programs launch on their own

which of the following are ways to safely download antivirus software

- download the software from a trusted sit like www.cnet.com - download the software form a known anti-virus software vendor

Select the characteristics solid state drive storage devices

- durable, no moving mechanical parts - use electronic circuits to store data

Characteristics of solid state drive storage devices

- durable, no moving mechanical parts - uses electronic circuits to store data

True regarding Fiber Optic Internet service

- fastest home network option when available -not available in all areas - signal is carried by light waves so it's less subject to electromagnetic interference

select the characteristics of cloud storage

- files are backed up (stored on multiple servers) - servers act like giant hard drives - users can download files to other devices on the internet

Characteristics of a hard drive

- has a read/write head to detect magnetic charges - uses magnetic charges to store data - has physically spinning platters

select the characteristics of a blu ray disk

- holds approximately 25gb of data -uses pits and lands to store data

Characteristics of a DVD

- holds approximately 4.5 GB of data - uses pits and lands to store data

which of the following should be considered when choosing an ISP?

- how many users will be logged on my network at the same time? -will users be streaming data? -what ISP choices are available in my area?

cyberattacks include

- identity theft - pharming - DDOS attacks

Rootkits allow a remote user to so which of the following

- install rogue files - create backdoor programs - delete files

Of you own a small business, what can you do to ensure your computers and data is kept secure?

- keep software updated, particularly antivirus software - physically secure computers to minimize risk of theft - backup your data regularly

what is true regarding keystroke loggers

- keystroke loggers can record passwords and confidential information - can be hardware devices and software applications - software based keystroke loggers are often a trojan that is installed without the user's knowledge

True about packet sniffers

- legitimate sniffers are used for routine examination and problem detection - unauthorized sniffers are used to steal information

what is true about packet sniffers

- legitimate sniffers are used for routine examination and problem detections - unauthorized sniffers are used to steal information

the correct statements about fee based antivirus and free anti-virus software

- most of the free anti-virus programs perform almost as effectively as their fee-based counterparts - one of the main differences between free and anti-virus software is the number of features ------------ incorrect!!! one of the positives of free anti-virus software is their spam detection performance

When choosing a cell phone provider, factors to consider include

- network size/ coverage - service/speed -pricing

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating the business's social media sites

Storage devices

- optical drive -external hard drive - USB drives

on the privacy tab in internet explorer you can adjust which settings?

- override your privacy settings for certain types of cookies - block or allow specific websites - what types of cookies are blocked or allowed

typical firewall programs or hardware devices filter all information coming through the internet to your network or computer system. there are a variety of techniques that are used to minimize the risk of harmful infusion into a computer or network including

- packet filters - proxy servers

Advantages of helium drives over traditional hard drives

- platters spin faster - platters stay cooler - more platters can be placed on the same amount of space

which of the following are symptoms of an online nuisance attack?

- pop up start appearing after you visit unfamiliar sites - receiving a lot of spam messages or bounced back email messages - frequent pop-ups while searching the web or working in programs

examples of uploading files

- posting a photo on social media - placing an ad on craigslist - posting a YouTube video

Select the characteristics of a plotter.

- prints large graphic displays - mechanically moves a pen over a large sheet of paper - uses inexpensive toner rather than ink - paper turns black when heated

which of the following re factors to consider to help protect them hardware of your digital device

- protecting a digital device from humidity - protecting a digital device from magnetic fields - protecting a digital device from overheating

which of the following are common email viruses?

- ransomware - phishing - keystroke-logging trojan

Select the reasons of compress a file

- reduce storage space requirements - reduce bandwidth needed to transmit a file

Reasons for compressing a file

- reduce the bandwidth needed to transmit a file - reduce storage space requirements

Characteristics of a OneDrive account

- requires a Microsoft Email account - provides free cloud storage -can serve as extra storage space

Characteristics of computer storage

- retains data when power is turned off - sometimes referred to as a secondary storage

Methods of using cloud storage

- saving a photo on Flickr - purchasing online storage space -emailing a file to yourself

antivirus programs use a variety of techniques to identify and remove viruses and malware. two of the most common techniques are

- signature-based detection - heuristic-based detection

which of the following are online nuisances?

- spam - spoofing - spyware

Online nuisances

- spam -spyware -spoofing

Object-oriented databses

- store instructions for how to compute the data as well as the data to be processed - equipped to handle unstructured data such as MP4 files, video, images, and extremely large files - use object query language to construct queries that extract data from the database

important considerations when purchasing a new tablet computer include:

- the amount of RAM it has -the size of its screen -the amount of storage it has

Commonly used names for USB drives

- thumb drives - flash drives

What are some commonly used names for USB drives?

- thumb drives - flash drives

this is the system and security area that is accessed by clicking control panel>system and security. when you click windows firewall, what are some of the firewall settings you can adjust?

- turn windows firewall on or off - update your firewall settings - changes notification settings

what are the symptoms that your system has been hacked?

- unwanted browser toolbars - redirected internet searches - fake emails or social media messages from your account

Characteristics of cloud storage

- users can download files to other devices on the internet - files are backed-up (stored on multiple servers) - servers act like giant hard drives

True regarding Cellular Internet service

- uses cell phone radio waves to transmit and receive internet signals - many providers offer data packages that may place limits on uploading and downloading -many smartphones can send and receive WiFi signals, allowing them to become hotspots

Select the characteristics of SSD storage

- uses flash technology - has no mechanically moving parts - uses the same technology that is found in USB drives (thumb drives)

Characteristics of SSD storage

- uses flash technology - uses the same technology that is found in USB drives - has no mechanically moving parts

Characteristics of a traditional hard drive

- uses magnetic charges to store data -has a read/write head to detect magnetic charges - has physically moving platters

The characteristics of a traditional hard drive

- uses magnetically charged plates to store data - commonly found in desktop computers

true regarding satellite internet service

- uses microwaves to deliver service -provides broadband service virtually anywhere -customers usually purchase a data plan that limits uploading and downloading

Select the characteristics of a Blu ray disc

- uses pits and lands to store data - holds approximately 25 GB of data

True regarding DSL internet service

- uses telephone wires as transmission wires -internet signals tend to be very consistent

True regarding cable internet service

- uses the same coaxial cable that brings the cable television signal -usually has more bandwidth than DSL lines - Internet service can often be bundled with television service

Common types of malware

- viruses -worms - trojan horse

true about privacy risks with cookies

- websites using cookies can collect your information and sell it to third parties - Websites can track your surfing behavior and create a profile - Corporate and government entities can track your web behavior

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data

- what field name will the data fall under - what data type will be included

How can you attach a mouse or other pointing device to your computer?

- with a Bluetooth connection - with a wire through a USB port

Reasons for purchasing a broadband internet service

- you have several devices online at the same time - you need relatively high-speed internet service - you want Wi-Fi in your home

select the common word processing file extensions:

-.odf -.docx

Which of the following refer to ultra-high-definition television displays?

-4K UHD -8K UHD -UltraHD -SuperHd

Which of the following are considered storage media?

-DVDs -Blu-ray discs -external hard drives

The 3 phases that should be accomplished in the investigation step of the SDLC include:

-Defining the problem. What should this system do? Who will by using this IT system? -Examining alternatives. Can available hardware and software perform the same task? -Reporting. Document your investigation's findings.

There are a variety of cookie settings that can be adjusted in Google Chrome including

-Deleting cookies -blocking/allowing cookies by default -making exceptions for cookies from specific websites/domains

Identify the characteristics of a desktop computer.

-Desktops are useful for those who need a computer they can walk around with. -Desktops are often used in offices since they don't need to be mobile. -Desktops allow for relatively easy upgrade and expansion.

Select what's true about session cookies.

-Determine the start and end of a session. -Analyze and measure traffic on a web page. -Determine the web browser being used.

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.

-Holiday conversion - placing the new system online while everyone is gone. -Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly. -Parallel conversion - running both systems side-by-side for a while and then shutting the old system. -Direct conversion - shutting down the old system completely and starting the new one.

According to US-CERT if you receive a phishing message you should contact them using which of the following methods.

-In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. -In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. -If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.

Which of the following are ways to prevent computer virus infections.

-Install the latest antivirus software and update frequently. -Downloaded content from the web should only be from trusted sites. -Limit your web surfing to trusted sites.

Select the video file compression formats.

-MP4 -MP3

Select the characteristics of RFID.

-Select the characteristics of RFID. -RFID can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -High-frequency RFID can transmit signals further than 1500 feet. RFID doesn't require line of sight scanning.

Which of the following should you consider when buying a new computer?

-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot? -Does it come with Windows XP?

Which of the following statements about Instagram are true?

-Your Profile section on Instagram must be accurate. -It is important to adjust your privacy settings so you can determine who follows you. -If you don't want to be tracked turn off geo-tagging in the settings under Location Services.

online nulsances

-adware -spyware -spam

Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).

-allow cookies -delete cookies block cookies

select the statements that refer to color depth

-also known as "bit depth" -a measure of the accuracy of the color of each pixel -specifically, the number of bits of data describing each pixel in a display

identify what's true about script kiddies.

-amateur computer hackers with little programming expertise -illegally gain access to computer systems using programs (scripts) that others have written

Functions of a Digital Signal Processor

-analyzes signals received from the analog-digital converter to enhance audio quality -reduces unwanted noise -moderates call volume

select the functions of a digital signal processor

-analyzes signals received from the analog-digital converter to enhance audio quality -reduces unwanted noise -moderates call volume

select all the tablet computers

-apple ipad -samsung galaxy note PRO -amazon fire hd

True about worms

-automatically reproduce - replication exhausts networks bandwidth or available storage - often sent using email attachments

select whats true about worms:

-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email attachments

Select what's true about worms.

-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email attachments

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

-be brief and direct -state only what you witnessed

On-going series of events

-blackmail -cyberstalking

Select appropriate LinkedIn contacts.

-business contacts -professional peers

Select the true statements regarding an LED display.

-can be extremely thin -extremely energy efficient -create a significant amount of heat

select the common internet transmission media:

-coaxial cable -telephone wire -cell phone radio waves

select what's true about macro viruses

-commands in the macro language set off the destructive events -when file is opened the macro virus executes -initiated by downloading and opening an infected attachment

Select the characteristics of thermal printing.

-commonly used for printing receipts -paper turns black when heated -makes high quality photo prints -useful for printing multiple color copies

if you believe you have fallen victim to phising scam

-contact the instituition was message was allegedly sent from -contact US-CERT

if you believe you have fallen victim to a phishing scam you should:

-contact the institution the message was allegedly sent from -contact US-CERT

If you believe you have fallen victim to a phishing scam you should

-contact the institution the message was allegedly sent from. -contact US-CERT.

hacker

-cyberterrorist -black hat -white hat -script kiddles

Which of the following are considered cybercrimes?

-data manipulation -data corruption -cyberbullying

Which are true regarding a screen's resolution?

-equals the number of pixels in a display -described as distance between 2 pixels -equals the diagonal length of the screen

symptoms that your system has been hacked

-fake emails or social media messages from your account -redirected internet searches -unwanted browser toolbars

online nuisance

-frequent pop-ups while searching the web/working in programs -pop-ups start appearing after visiting unfamiliar sites -receiving a lot of spam emails and bounced back email.

select the characteristics of a dvd

-holds approx 4.5 gb of data -uses pits and lands to store data

Select the characteristics of a Blu-ray disc.

-holds approximately 25 GB of data -uses pits and lands to store data -a read/write head senses the magnetic charges

Select the characteristics of a CD

-holds approximately 700 MB of data -uses pits and lands to store data

Select the characteristics of a CD.

-holds approximately 700 MB of data -uses pits and lands to store data -a read/write head senses the magnetic charges

virus symptoms

-if a system/network is infected severely, it may even black out/ not even launch the startup process - the operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. -critical files may get deletd automatically , and this can happen periodically or all at once

which are considered cybercrimes?

-internet scams -cyberespionage -information theft

considered cybercrimes

-internet scams -cyberspionage - information theft

Select the features common in DSLR cameras.

-often allow for interchangeable lenses -are less expensive than point-and-shoot cameras

Select the features common in DSLR cameras.

-often allow for interchangeable lenses -usually have a mirror that allows the photographer to look directly through the lens -rarely include optical zoom -are less expensive than point-and-shoot cameras

Select what's true about Trojan malware.

-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls

A digital identity is comprised of a variety of digital attributes including

-online search activities -the spreadsheet software you're using.

Select the current uses for RFID tags.

-package tracking -inventory tracking -musical fidelity

In the settings area of each browser you should consider

-periodically deleting cookies. -blocking/customizing your cookie settings. -decide from which sites you want to allow cookies.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following?

-periodically reviewing computer-use policies -enforcing standards by creating firewalls, monitoring protocols, and filters -instructing employees on standards

Internet service options

-satellite -cable -fiber optic

Select the factors that should be considered when purchasing external speakers for a digital device.

-sound quality -portability -price

select the sites that offer internet speed test services

-speedtest.net -testmy.net

Malware is designed to do which of the following?

-steal info - incapacitate a computer/network -destroy data

select the statements that are true regarding switches

-switches connect computers and other devices within a network -switches are usually integrated in the routers of home networks -switches ensure that correct data is transferred to and from the appropriate devices in networks

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

-tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. -tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. -tell you boss that others have told you that this co-worker frequently visits porn sites at work.

select the statements that refer to the term "dot pitch"

-the distance between two adjoining sub-pixels in a display -the closer the spacing (the smaller the dot pitch) the sharper the image

which statements are true regarding instagram?

-the profile section lists your name, birthday, gender and phone number -if you dont want to be tracked, turn off geo-tagging in the settings under location services

true about passwords

-the term passcode and key are synonyms for pw -pws can be used to secure computers, networks,software,personal accounts and digital devices

select the characteristics of a traditional hard drive

-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters

select the characteristics of a traditional hard drive

-uses magnetically charged plates to store data -commonly found in desktop computers

select the statements that are true regarding satellite internet service

-uses microwaves to deliver service -provides broadband service virtually anywhere -customers usually purchase a date plan that limits uploading and downloading

select the statements that are true regarding cable internet service:

-uses the same coaxial cable that brings the cable television signal -usually has more bandwidth than DSL lines -internet service can often be bundled with television service

select the characteristics of a projector

-usually requires a darkened environment -allows large audiences to view digital output -usually used with a screen

ways to catch a computer virus

-visiting questionable internet sites -downloading files from the internet -borrowing a friends usb storage device to save a file.

select the statements that describe a computer programmers algorithm

-written in a natural language such as english -written in the form of a flowchart so that it will be more easily converted into a programming language

Which of these extensions, if you open it, will probably install software onto your computer?

.exe

file extension used for drawings

.gif

A smartphone emits approximately _____ watts of microwaves

0-1

this is window firewall area

1) clicking start button 2. control panel 3. system and security 4/ window firewall

steps to have firefox block cookies from one website

1) go to website 2) right click 3) in the page info 4)underneath set cookies

What are the advantages of a point and shoot camera over a smartphone camera?

1) larger pixel sensor arrays, providing higher resolution 2) point and shoot cameras, being thicker, often come with optical zoom capability

characteristics of a plotter

1) prints large graphic displays 2) mechanically moves a pen over a large sheet of paper

Select the statements that refer to the term "dot pitch"

1) the distance between two adjoining sub-pixels in a display 2) the closer the spacing (the smaller the dot pitch) the sharper the image

steps of a virus infection in correct order

1) the virus arrives via email attachment, file download, or by visiting an infected site. 2) action such as running/ opening the file triggers the virus. 3) the payload is activated & virus starts its destructive actions.

Which of the following are true regarding high definition displays?

1) typically have aspect ratios of 16:9 2) typically have 1,080 horizontal lines of pixels

According to Mozilla, one of the most effiicient ways to clear cookies in Firefox

1)click the menu button, choose History and then Clear Recent History 2) once you have cleared recent history you should set the time range to clear Everything 3) Click on the arrow next to details to expand list of history items 4) select cookies and make sure that other items you want to keep are selected. close the clear recent history window. 5) click clear.

The text contained in about 4 books uses approximately ___ times more data than a short email.

1,000

1. Ways to avoid a computer virus 2. Ways to catch a computer virus

1. Adjust your web browser's security settings to allow browsing only on trusted sites Surf the web and download content safely Purchase a new router every other year to ensure you have the latest firewall protection 2. Downloading files from the internet Opening suspicious or infected email messages Visiting questionable websites

Rank the following by capacity with the smallest at the top

1. Compact Disc 2. Digital Versatile Disc (single layer) 3. Digital Versatile Disc (double layer) 4. Blu-ray Disc

1. Online nuiscance 2.Virus

1. Frequent pop-ups while searching the web Receiving a lot of spam emails and bounced back email Pop-ups start appearing after visiting unfamiliar sites 2. You cannot boot your computer Your computer is running slower than usual

step adjusting cookie settings

1. choose safari 2.click preference 3. click privacy 4) change cookie

according to Mozilla, one of the most efficient ways to clear cookies in Firefox is

1. click the menu button, choose history, and then clear recent history 2. once you have to cleared recent history you should set the time range to clear everything 3. click on the arrow next to details to expand list of history items 4. select cookies and make sure that other items you want to keep are not selected. close the clear recent history window 5. clear clear now to clear cookies

place the steps of the program development life cycle in the correct order

1. defining the problem 2. creating a plan 3. writing the code 4. debugging the code 5. testing the code

place the steps of the SDLC in order

1. investigation 2. analysis 3.design 4. develop

1. L1 cache 2. L3 cache 3. Disk cache

1. memory located directly on the processor itself 2. memory located adjacent to the processor 3. memory used to increase a hard drive's efficiency

according to Microsoft, what is the correct order of steps to accept all cookies in internet explorer?

1. open internet explorer 2. click the tools icon 3. click internet options 4. click the privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply

most efficient way to block cookies is

1. open the desktop, and then tap or click the internet explorer icon on the task bar 2. tap or click the tools bar, and then tap or click internet options 3. tap or click the privacy tab, and under settings, move the slider to the top to block all cookies, and then tap or click OK

place the steps in order to store a file on google drive

1. open your google drive account (sign in if necc) 2. click on new to open the drop-down menu 3. select file upload 4. browse to the file and click open

put the remaining steps required to set parental controls in Mac OS X in the correct order

1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. in the user is not in the list, click add, then fill in the name, account, and password information to create a new user

put the steps of a virus infection in the correct order

1. the virus arrives via email attachment, file download, or by visiting an infected site 2. an action such as running or opening the file triggers the virus 3. the infection is spread to other devices or a network 4. the payload is activated and the virus starts its destructive actions

put the steps in order to open a microsoft email account:

1. type "onedrive.live.com" into your browser window 2. select personal and sign up for free 3. select create a microsoft account 4. select get a new email address

select the 3 main ways of detecting and recording fingerprints

1. ultra sonic- uses sound waves to detect ridges and whorls 2. optical- take a photo of the fingerprint 3. capacitance- uses electron movement, similar to a touchscreen or touchpad

1.Virus symptoms 2.Ways to catch a computer virs

1.Critical files may get deleted The operating system may not launch properly If a system or networks is infected severely, it may even black out or not even launch 2.Borrowing a friends USB storage device to save a file Downloading files from the internet Visiting questionable internet sites

According to Microsoft, the most efficient way to block cookies is:

1.Desktop 2.Tap or click Tool button 3. Tap or click privacy

1. 5GL 2. 4GL 3. 2GL 4. 1GL 5. 3GL

1.Extremely advanced - uses statements (scripts) rather than algorithms. 2. Specifically designed for creating database management programs. 3. Assembly language - an assembler converts 2GL into machine language. 4.Machine language - represented by a series of 1s and 0s. 5.High-level programming language - uses a compiler to convert into machine language.

According to Microsoft, the most efficient order of steps to customize cookie settings is

1.Open desktop 2.Tap or click 3.BIG PARAGRAPH 4. When you are done

1. Online nuisance 2. Virus

1.Receiving a lot of spam emails and bounced back email Pop - up start appearing after visiting unfamiliar sites Frequent pop ups while searchings the web or working in programs 2.Your computer is running slower than usual You cannot boot your computer

Put the remaining steps required to set parental controls in Mac OS X in the correct order

1.Select system perferences then click parntal controls 2.Click the lock icon to unlock it 3.Select a user, then enable parental controls 4.If the user is not in the list, click Add, then fill in name

1. input 2. storage 3. output

1.entering text in a word doc 2.putting a photo onto a USB drive (thumbdrive) 3.playing a song from spotify

Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.

10

High definition displays typically have ______ horizontal lines of pixels.

1080

Capacity of a typical tablet

16-256 GB

iPad

16-256 GB

"Full HD" resolution is expressed as:

1920 x 1080

full HD resolution is expressed as

1920x1080

Twitter recommends using no more than ___ hashtags per Tweet.

2

Personal computer CPU clock speeds range between _______ .

2 to 4 gigahertz

the item that uses approximately 1 gigabyte of data

20 music CDs

Blu-rays provide approximately ___ of data storage space

25 GB

As of 2017, tweets can be a maximum of ___ characters.

280

as of 2017, tweets can be a maximum of _____________ characters

280

Which area of the control panel screen in windows 7 allows you to adjust parental control

3 user accounts

DVD

3-5 GB

Also known as additive manufacturing (AM), ______ printing sprays successive layers of material to create an object

3D

Also known as additive manufacturing (AM), _________ printing sprays successive layers of material to create an object.

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

3D

select all the technologies used for facial recognition

3D mapping, feature charting, and skin texture

This is a Mozilla Firefox screen. Where on the screen would you click to delete cookies

4 line one

What is the most complex program language generation? 1G or 5G?

5G

A tablet is generally understood to have a screen size of at least ____ inches

7

CDs provide approximately _____ of data storage space

700 MB

Distributed Denial of Service

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

DoS and DDoS Attacks

A DoS attack stands for Denial of Service. A DoS is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. A DDoS attack stands for Distributed Denial of Service. A DDoS attack launches a virus on a computer. Once the computers are infected they act as zombies and work together to send out legitimate messages creating huge volumes of network traffic resulting in a network crash.

Computer Virus

A computer virus is software that infects computers and is created using computer code. Computer viruses typically must be "run" to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network.

Cookie

A cookie is a small text file of information created by websites you visit that your web browser stores on your hard disk. When you revisit a website that uses cookies your browser will send the cookie to the Web server which uses this information to customize and optimize your experience.

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

Cyberattack

A cyberattack is a deliberate misuse of computers and networks. Cyberattacks use malicious code to modify the normal operations of a computer or network, resulting in disruptions that can compromise data and lead to a variety cybercrimes.

Cyberterrorist

A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Attacks include the disruption of ecommerce and government sites. The power grid and public utilities have also been targeted.

worm

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worms

A destructive program that replicates itself throughout a single computer or across a network. Automatically reproduces itself. Designed to attack both wired and wireless networks. Replication exhausts network bandwidth or available storage.

Firewall

A firewall is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. Firewalls allow or block Internet traffic in and out of a network or computer. An ideal firewall configuration consists of both hardware and software. Personal software firewalls are typically included with the operating system and can be configured based on user preference. Hardware based firewalls can be purchased as a stand-alone product but are often also included in broadband routers.

Botnet

A group of compromised computers controlled by a hacker is called a _____.

Hacker

A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. The term hacker and cracker are synonymous.

Hacker

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

1. Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2. Tap or click the Tools button Tools , and then tap or click Internet options. 3. On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4. When you're done making changes, tap or click OK.

According to Microsoft, the most efficient order of steps to customize cookie settings is?

1. Click the menu button, choose History, and then Clear Recent History. 2. Once you have cleared recent history you should set the time range to clear Everything. 3. Click on the arrow next to Details to expand list of history items. 4. Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.

According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?

Identify what is true about script kiddies

Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that other have written

Script kiddies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

Internet Filters

An Internet filter is firewall software used to block access to specific Internet content. Filters can be used by organizations, parents, and businesses to restrict access to file transfers, web sites, or Internet downloads. The software can reside in a router or user's computer, a stand-alone filter attached to a server or on a network. Internet/web filters are also called parental controls.

FireWire connectors were developed for ______ computers.

Apple

The mouse was developed by which company?

Apple

What company popularized the use of the mouse for PCs?

Apple

On a mac home screen, where do you click to access to adjust parental control settings?

Apple Settings

Select the popular video teleconferencing applications.

Apple Facetime microsoft skype google+ Hangouts

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

Bluetooth

Using extremely low power radio signals, short-distance wireless connections are often made using ________ technology

Bluetooth

Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies

C

What programming languages work best for PC games?

C and C++

_____ was developed by Microsoft and works well with Window-based OS

C#

What is the binary code for the character Z? A)1111 1111 B)1110 1001 C)0101 1010 D)1010 1001

C)0101 1010

______ is an eight-bit character coding scheme commonly used on many personal computers. A)EBCDIC B)Hexadecimal C)ASCII D)Unicode

C)ASCII

Refers to a computers processor

CPU

shortcut for bold

CTRL + B

shortcut for copy

CTRL + C

shortcut for cut

CTRL + X

Shortcut for Undo

CTRL + Z

Three important types of memory in your computer include registers, RAM, and ___

Caches

Fingerprints are most commonly scanned using ____________ technology

Capacitance

Most touchpads use _______ to "sense" when a finger has moved across the pad

Capacitance

____________ fingerprint scanners are the most common biometric identification devices.

Capacitance

This is the System and Security area that is accessed by clicking Control Panel System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?

Change notification settings Update your firewall settings Turn windows firewall on or off

Password techniques

Change your passwords frequently. Use generic passwords. Keep your password private. Use a combination of letters, symbols, and numbers. Check your accounts.

1. Choose Safari. 2. Click Preferences. 3. Click Privacy. 4. Change cookie settings.

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari.

with a capacity of about 600-700 MBs, ___ disks are most commonly used to store music files

Compact

To adjust your Windows computer's display settings, it's often easiest to go to the ___ panel. - Start - Display - Control - Settings

Control

Privacy risks with cookies

Cookies pose many potential privacy risks. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

Persistent

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

The digital personal assistant that comes with Microsoft's Windows 10 is called ___ . - HAL - Cortana - Siri - Alyx

Cortana

A deliberate misuse of computers and networks, ______ use malicious code to modify the normal operations of a computer or network

Cyberattacks

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

Cyberbullying

Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner. Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging with the intention of harming another person. Cyberbullying is also known as cyberstalking.

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _______

Cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.

Cybercrime

Cybercrime

Cybercrime is criminal activity committed with a computer.•Cybercrimes include cyberespionage, information theft, data manipulation, cyberbullying, and data corruption. •The Office of Homeland Defense reported that cybercrime has increased by 400% in the last year. Cybercrime is a crime in which a computer is the object of the crime or is used to commit a crime or offense. •There are two common types of cybercrimes, Single event and On-going series of events.

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.

Cyberterrorist

An attack in a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ______ attack

DDoS

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

You can change your Firefox setting to allow you to

Delete cookie Approve cookie Deny cookie

In the settings area of each browser you should consider

Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings

In photography, there are two ways to focus on distant objects: optical zoom and _______ zoom.

Digital

A digital presence created online by an individual or organization using a digital device as called a __________

Digital identity

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests called

DoS attack

What is true about RFID?

Does not require line-of sight scanning Can transmit signals more than 90 feet Can be used to identify a variety of objects

Which of the following are ways to safely download antivirus software

Download the software from a known anti virus software vendor Download the software from a trusted site like www.cnet.com

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

Dynamic

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

in the united states, the federal ____________ covers most consumer oriented electronic transactions

EFT act

Free openly licensed learning resources that are available online for instructors and students to use are called Open _______ Resources

Education

A mouse that fits the hand comfortably and can reduce the risk of repetitive stress injuries such as carpel tunnel. What is it called?

Ergonomic Mouse

The art and science of creating output that provides information in the most useful manner is called ___ .

Ergonomics

T/F International laws on internet privacy are very similar

F

In a database a ______ is a group of related characters in a database table that represents a characteristic of someone or something

Field

All of the following are considered e-commerce transactions except

G2B

_______ analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait

Samsung smartphone

Galaxy s6

Safe browsing tactics

Go Incognito - The four most popular web browsers have a private browsing option. Be cautious when using social media - Go to Facebook click on settings then download a copy of your Facebook data. Consider using a VPN - Virtual Private Networks (VPNs) are a very useful tool in protecting your online identity. HTTPS - Make sure the sites you are visiting have "https" at the beginning of the URL.

Put the steps to have Firefox block cookies from one website in the correct order

Go to the website you wish to block from setting cookies in Firefox Right-click In the page Underneath

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

GoPro

A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.

HDMI

The standard port for video and audio input into televisions today is the ______ port.

HDMI

A port that allows the transfer of high quality video and audio signals is called an ________

HDMI port

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire _______

HDX

The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.

Hacktivism

Hacktivist

Hacktivism is the act of hacking, or breaking into a computer system for a politically or socially motivated purpose. Individuals who take part in hacktivism are called hacktivists. Hacktivism uses the same techniques as a hacker, but does so in order to disrupt services and to bring attention to a political or social cause. Anonymous is one of the hacktivism groups that receives a lot of press.

Hacking computer systems for a politically or socially motivated purposes is called

Hacktivist

cyberbullying

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

To allow hard drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air

Helium

Firewalls Anit virus programs Anit malwarre apps

Help protect against worms and hackers Help protect against viruses Help protect against malware

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

Heuristic-based detection Signature-based detection

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the record then make up a table. This organization is referred to as a data ______

Hierarchy

HDMI stands for:

High definition multimedia interface

The abbreviation for megahertz is ___ .

MHz

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

All of the following are common ports that are included with laptop computers except

MIDI Ports

all of the following are common ports that are included with laptop computers except

MIDI ports

A popular lossy video and audio compression format is ___

MP4

two most common audio file formats are WAV and ______________

MP4

The video file compression formats

MP4, AVI, QuickTime

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

Macro virus

the technology that provides a type of firewall protection by hiding internal IP address is called

NAT (network address translation)

A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .

NFC

Apple Pay uses _____ for payment transfer.

NFC

NAT

Network Address Translation (NAT) was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet. NAT provides a type of firewall protection by hiding internal IP addresses. NAT can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS.

This is the privacy tab in internet Explorer. IS the slider in the image set to the right level to allow all cookies?

No, to save all cookies you need to move the slider all the way to the bottom

Relatively expensive technology, but makes extremely thin, curved and flexible displays possible.

OLED

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

OLED

though currently expensive, curved and paper-thin displays are possible using __________ display technology

OLED

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.

OMR

Select what's true about Trojan malware

Often uses to find passwords, destroy data, or to bypass firewalls Similar to viruses, but do not replicate themselves Often found attached to free downloads and apps

Find the incorrect statement about fee based antivirus and free antivirus software

One of the posties of free anti virus is their spam detection performance

How does antivirus software work?

One popular technique that antivirus software uses to detect viruses is to look for a virus signature, or virus definition. A virus signature is the software code of a particular computer virus. The antivirus program compares its database of known virus signatures with the files on a digital device and on removable media. Antivirus software companies are constantly searching for and updating their database of known signatures. It is important to make sure your antivirus program is on a regular update schedule. Once the virus is identified the antivirus software attempts to remove the virus. If the software cannot remove the virus it will send the file to an isolated area on the hard drive called a quarantine. Quarantined files will remain on your computer until you delete or restore them.

Online nuisances

Online nuisances are annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money. Online nuisances include: ---Spam ---Spyware ---Phishing and Pharming ---Trolling and Spoofing

In photography, there are two ways to zoom-in on distant objects: digital zoom and _________ zoom.

Optical

Most cellphones cameras do not have ______ zoom capability

Optical

Using reflective material to store data that can be read using a laser is called ___ media storage.

Optical

Printer manufactures often advertise how fast their printers are by using the acronym ________.

PPM

Printer manufacturers often advertise how fast their printers are using the acronym:

PPM (pages per minute)

There are a variety of techniques tha tare used to minimize the risk of harmful intrusions into a computer or network including

Packet filters Proxy

Persistent Cookie

Persistent cookies are stored on the hard drive and are not lost when the web browser is closed. Persistent cookies are only lost if they are designed with an expiration date. Persistent cookies collect information about user preferences, username and password information, IP address, and web surfing behavior.

Phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. In order to appear legitimate the message often contains the company's logo and identifying information. Phishing uses legitimate looking email messages to con a user into giving up private information such as account numbers, social security numbers and personal information. Phishing scams direct users to a fake website where they are asked to enter or update personal information.

Phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. •In order to appear legitimate the message often contains the company's logo and identifying information. Phishing uses legitimate looking email messages to con a user into giving up private information such as account numbers, social security numbers and personal information. •Phishing scams direct users to a fake website where they are asked to enter or update personal information.

To create an image, the technology used by smartphones is called active ____________.

Pixel Sensor

The 4 major steps in the software development process are:

Planning Programming Debugging Beta Review

This is the options tab in Firefox. where would you click to adjust cookie settings

Privacy

PDLC

Product Development Lifecycle

Which of the following are factors to consider to help protect the hardware of your digital device

Protecting a digital device from overheating magnetic fields humidity

largest memory of a computer, connected to the processor via the front side bus

RAM

the place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___________

RAM

__________ is actually storage since it retains data and information when the power has been turned off

ROM (read only memory)

RFID stands for which of the following.

Radio Frequency Identification

RFID

Radio Frequency Identification Used to track physical items

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called

Ransomeware

The term that describes how fast each pixel in a display is updated is ___ .

Refresh rate

which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a ______

SSID

which of the following refers to the distribution of computer applications over the internet and is commonly referred to as web apps?

SaaS

Session Cookie

Session cookies are files that are stored in temporary memory. Session cookies are lost when the web browser is closed. Session cookies collect information about the start and end of a browsing session, analyze and measure web traffic on the web pages visited, and determine the web browser being used.

web cookie

Small text file of info. created by website you visit that that your web browser stores on your hard disk

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.

Smartboard

Pictures or videos taken and shared on Snapchat are called _____.

Snaps

spyware

Software that collects information about your Internet surfing habits and behaviors is called _____.

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

Virus Symptoms

Some virus symptoms include: The operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. Critical files may get deleted automatically, and this can happen periodically or all at once. Error messages will become prevalent. It may become difficult to save documents, and the computer may be running slower than usual. If a system or network is infected severely, it may even black out or not even launch the startup process.

Phishing Ransomware Keystroke-logging Tojan

Tricks user into revealing usernames and passwords by appearing legitimate When activated encrypts files on user hard drive and then sells a decryption programs When activated, saves all keystrokes for subsequent transmission to virus creator

Often accompanying download music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a

Trojan

a program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus

Trojan

program that appears legitimate, but executes an unwanted activity when activated is called --horse virus

Trojan

Often accompanying downloaded music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a ______

Trojan horse

A program that appears legitimate, but executes an unwanted activity when activated is called a

Trojan horse virus

How do firewalls work?

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including packet filters and a proxy server. A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules. Proxy Server - Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network.

this type of connector is the most common for connecting peripherals (printers, monitors, storage devices etc) to a computer

USB

One type of storage device is a ___ .

USB Drive

One type of storage device is a ___

USB drive

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

URL stands for

Uniform Resource Locator

How does a virus infect a computer?

Viruses can affect a digital device in a number of ways including: ---Opening an infected Email attachment ---Downloading an infected file from the Internet ---Sharing infected files ---Visiting a contaminated Web site

when discussing digital cameras or smartphone cameras with APS CMOS, APS stands for _________________

active pixel sensor

develop a cisco and used by firewall

address

developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network _ Translation provides a type of firewall protection by hiding internal IP addresses

address

developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses

address

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called _____ computers.

all-in-one

designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer

all-in-one computer

select the popular video teleconferencing applications

apple facetime, microsoft skype, google+hangouts

what is true about worms

automatically reproduces itself

a device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ______________ reader

barcode

In order to download an app from the Microsoft Store will need to ___ . - be logged into a Microsoft account - have a debit card - be logged into a Google account - be over 18 years old

be logged into a Microsoft account

the final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) _______________ test

beta

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

A hole in a punchcard, a transistor on a circuit board, or the reflective element on a DVD each represent the smallest unit of data storage called a ___

bit

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.

bit

The smallest unit of data is a ____

bit

The smallest units of storage is called a ___. It is the data held or processed by a single transistor

bit

represented as either a 0 or 1, a ____________ is the smallest unit of data a computer can process

bit

A _ hat hacker breaks into computer system with the intent of causing damage or stealing data

black

Intrusion Detection Systems use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ______, which closes the access point used by the hacker

block

intrusion detection systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___________, which closes the access point used by the hacker

block

A group of compromised computers controlled by a hacker is called a _____.

botnet

An internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a _______ signal

broadband

software applications that allow users to access and surf the world wide web are called _______________

browsers

A USB drive, also called a thumb drive or a flat drive, is a popular external storage choice. USB stands for universal serial ___

bus

One character of information, for example, a letter or a number consists of one ____ of storage

byte

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

character

Having your files stored on multiple online servers means there is minimal risk of your data being lost. This is a significant advantage of using ___ storage

cloud

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods

cloud

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.

cloud

The amount of data that defines each color in a pixel is called ____ .

color depth

the number of bits of data describing each pixel in a display is referred to as ___________

color depth

Router

connects 2 networks

Switch

connects devices within a network

spyware is

considered an online nuisance

according to US-CERT if you receive a phishing message you should contact them using which of the following methods?

contact them either via email or phone

The part of the processor that tells the computer's memory, arithmetic logic unit and input and output devices how to respond to a program's instructions is called the ______ unit

control

the two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.

control

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

control panel

Modem

converts analog signals into digital signals and digital signals into analog signals

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

a small text file of information created by websites you visit that your web browser stores on your hard disk is called a _______________

cookie

Small test files created websites you visit that your web browser stores on your hard disk is called

cookies

what was the major question that ARPAnet wanted to solve?

could a network be built that would continue to work even if multiple parts collapsed?

if you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down _________ and drag the file

ctrl

A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called

cyber crime

The malicious use of computer code to modify the normal operations of a computer or network is called a _____

cyberattack

a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___

cyberattack

the malicious use of computer code to modify the normal operations of a computer or network is called a _____________

cyberattack

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a

cyberbully

crime in which a computer is the object of the crime / used to commit a criminal offense

cybercrime

which of the following statements about facebook is true?

cyberstalking and online predators are a real problem on facebook

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____

cyberterrorist

aperson who uses computers and the internet to launch attacks against computer systems for political/ ideoological reason

cyberterrorist

Being able to surf the web, watch videos, and listen to streaming audio is why cell service with a _____ plan is extremely popular in the U.S.

data

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a _____

data analyst

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ________________. most often, this crime is committed by employees inside the company rather than outside hackers

data theft

match the extension with the type of document: .accdb

database

devices with a separate system unity and a relatively large footprint are called ______________ computers

desktop

writing software follows a 5-step process called the PDLC. PDLC stands for the program ________________ life cycle

development

screen size is measured by the ___________ across the monitor

diagnol

screen size is measured by the __________

diagonal distance between the upper right and lower left corners of the screen

How is Screen size messure?

diagonally from a top corner to a bottom corner of a visible display

When you ______ a file Windows should automatically open it. If it can't Windows will prompt you to select to correct app to open the file

double-click

Transferring a file from the Internet to your digital device is called _____.

downloading

it is important to think before click when _ software from the web

downloading

The optical media most often used to store movies are ___ and have a capacity of approximately 4-5 GBS

dvds

solid state drives store data using _________________

electronic circuits

A significant advantage of using a solid state drive instead of a traditional hard drive is that a solid state drive uses ___ so it has much shorter access times

electronics

which transmission has the largest bandwidth?

fiber optic

a URL identifies a particular ____________ address on the world wide web

file

a protocol commonly used to transfer large files from one server to another on the internet is the __________

file transfer protocol

software that limits the material that a browser fetches or that a search engine displays are called ______

filters

A security system separating 2 networks or even computers on the same network is called a _____

firewall

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

The red arrow in the image is pointing at what component of a network designed to prevent unauthorized internet intrusions

firewall

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.

flowchart

a graphic representation of a process is called a __________

flowchart

all of the following are considered e-commerce transactions except

g2b

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery

gait analysis

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

gait analysis

Storage capacity for laptop hard drives is typically described in terabytes or ___ .

gigabytes

Storage capacity for laptops hard drives is typically described in terabytes or ____

gigabytes

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called

hacktivism

MEMS chips are used in which of the following?

hearing aids, smartphones

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ______

information systems technician

These facilitate getting data and information into your computer.

input devices

these facilitate getting data and information into your computer

input devices

Adam was in fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ________

integrity

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

memory located directly on the processor itself

l1 cache

designed for those who need a mobile computer but need to enter a large amount of data

laptop computer

because of their compact size, touchpads are most often used with _____________ computers

laptops

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

large

select the android operating systems

lollipop, marshmallow

Because a metal platter is physically spinning, hard drives have ______ access time than solid state hard drives

longer

because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives

longer

file compression: reduces space required by removing less valuable data

lossy

most desktop computers use ___ to store data

magnetic hard drive

One of the largest data requirements of the future will likely be _____

mapping patients' genomes

A million bytes of data equals approximately one ______

megabyte

One million bytes equal a ___ of data. This is enough to store the text in approximately four books

megabyte

a million bytes of data equals approximately one ________________

megabyte

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___

memristor

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

memristor

an electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ________________

memristor

Examples of input devices

mouse, keyboard and camera

Examples of input devices include what?

mouse, keyboard, and camera

select the features common in DSLR cameras

often allow for interchangeable lenses, usually have a mirror that allows the photographer to look directly through the lens

To type on a touchscreen device with Windows 10, enable the ______. - dragon type - mouse - on-screen keyboard - touchscreen

on-screen keyboard

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable

packet

Specialized hardware/ software that capture packets transmitted over a network are called

packet sniffers

BitTorrent utilizes no central server, instead opting to utilize a _____________ structure where each device connected to a network has equal access to shared files

peer-to-peer

a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called _______________

pharming

Adding an app's icon to the taskbar in Windows 10 makes the application easily accessible. This is called ___ the app to the taskbar. - tagging - attaching - buttoning - pinning

pinning

Adding an application's tile to the Start menu in Windows 10 is called ___ the app. - highlighting - starting - pinning - Activating

pinning

Blu-ray stores data using

pits and lands that are read by a blue spectrum laser beam

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ______.

plotter

below is an image of the internet options tab in internet explorer. which tab should you click to block cookies in internet explorer?

privacy

this is the options tab in Mozilla Firefox. where would you click to adjust cookie settings

privacy

input

recording a song using MIDI

Click on icons represent popular password management apps

red * norton

which colors make up a typical monitor's pixels?

red green blue

when referring to digital storage, RAID stands for _____________

redundant array of independant disks

when referring to digital storage, RAID stands for

redundant array of independent dics

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

The term that describes how fast each pixel in a display is updated is ___ .

refresh rate

the term that describes how fast each pixel in a display is updated is ____________

refresh rate

extremely small amount of memory (measured in bits) located throughout the processor

register

The type of database that uses common fields to create links between tables is called a ______ database

relational

with optical zoom, resolution ______________ when focusing on distant objects

remains the same

To display or distribute information from a database, programmers or database administrators create

reports

To personalize your desktop in Windows 10, just put your cursor on any open area of the desktop, ___ and select "Personalize". - right-click - double-click - swipe - scroll left

right-click

Want to get rid of one of the app's on your Windows 10 taskbar? It's easy! First ___ the app's icon, then click "Unpin this app". - right-click - click on - double-click - scroll

right-click

Which of the following will open the account management area of Windows 10? - hold down Ctrl+Alt+Delete then click the Start button - right-click File Explorer and select account - right-click on the Start button - double-click the Start button

right-click the Start button

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ______

roaming

if youre in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called _________________

roaming

First-party cookie

small text file of info. created by a website you visit that keep track of your personal preferences and the current web browsing session

Third-party cookie

small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

first party cookie

small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Because it has no physically moving parts, an SSD is extremely durable and energy efficient. SSD stands for ____ state drive

solid

select the factors that should be considered when purchasing external speakers for a digital device

sound quality, portability, price

an unsolicited email message is called _____________

spam

T/F A transceiver can both send and receive information

t

A collection of related records in a database is referred to as a

table

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ______.

tablet

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

A thousand gigabytes equals one ___ .

terabyte

A thousand gigabytes equals one _____

terabyte

One thousand gigabytes equals one _____. That's enough capacity to store 40 blu-ray movies!

terabyte

Which of the following represent the highest amount of storage?

terabyte

which of the following represent the highest amount of storage?

terabyte

sharing an internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the internet, is referred to as _______

tethering

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the World Wide Web

HTML and it's 5th revision (html5) allow content to be displayed on _____________

the world wide web

The most common printers for printing receipts are ___ printers.

thermal

The most common printers for printing receipts are ______ printers.

thermal

the most common printers for printing receipts are _______________ printers

thermal

because they're inexpensive and reliable ___________ have become extremely popular storage devices

thumbdrives (USB or flash drive)

the world wide web was created through a collaboration led by _________

tim berners-lee

To create an image with a laser printer ___ is drawn to the drum.

toner

To create an image with a laser printer ___ is(are) drawn to the drum.

toner

The highest level in the domain name hierarchy is known as the ____

top level domain

match the business information system (IS) activity with the appropriate manage level: use IS to monitor overall business performance

top level management (business executives and presidents)

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

select the parts of an RFID system

transceiver, transponder, antenna

phishing

tricks users into revealing usernames and passwords by appearing legitimate

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

trojan horse

often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____________

trojan horse

As technology advances there are fewer keyboard options available for computer users.

true

similar to a tablet but comes with a detachable keyboard/touchpad unit

two-in-one computer

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.

uninstall

A USB drive uses special transistors that can store data when not powered. USB stands for ___ serial bus

universal

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

Removing an application's tile from the Start menu in Windows 10 is called ___ the app. - unpinning - executing - hiding - deemphasizing

unpinning

File server

used for data storage

to change the size of your folder's icon, just right-click on a blank area of the contents pane and click _____________

view

Software that infects a computer and is created using computer code is called a computer _____.

virus

ransomeware

when activated, encrypts files on user hard drive and then sells a decryption program

keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to bvirus creator.

keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

the more data being transmitted, the shorter the cord should be

which is true regarding the length of a USB cord

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ______

white hat hackers

non-malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called _____________

white hat hackers

a form of email fraud where criminals change the account where money is being transferred is called a ______________ scam

wire-wire

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe.

file compression: a lossless compression format

zip

Select what's true requarding all-in-one computers.

-All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. -All-in-one computers are designed to be highly mobile so that they can be used by people on the go.

Cybercrime

Cybercrime is criminal activity committed with a computer. Cybercrimes include cyberespionage, information theft, data manipulation, cyberbullying, and data corruption. The Office of Homeland Defense reported that cybercrime has increased by 400% in the last year. Cybercrime is a crime in which a computer is the object of the crime or is used to commit a crime or offense. There are two common types of cybercrimes, Single event and On-going series of events. Single event - Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud. On-going series of events - More serious than single event cybercrimes. On-going series of events include cyberstalking, child predation, extortion, blackmail, and terrorist activities.


Kaugnay na mga set ng pag-aaral

AP US History Chapter 2: Transplantations and Borderlands

View Set

ATI Pharmacology Made Easy 4.0 ~ Introduction to Pharmacology

View Set

Early Childhood Education (5025) - Praxis

View Set

Tissue Integrity & Incontinence Questions

View Set